A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.
-
Upload
dulcie-rice -
Category
Documents
-
view
212 -
download
0
description
Transcript of A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.
A Personal Data Audit Method through Requirements
EngineeringThomas van Eerden
AuthorsMiguel A. Martínez Joaquín LasherasEduardo Fernández-MedinaAmbrosio Toval Mario Piattini
All an academic background in Spain
IntroductionMethod that systematizes audit information
security systems.Focus: Sensitive data
Health Information Systems Information from the Government (about you)Police reportsEtc.
NamePersonal Data Audit Method based on
Requirements Engineering (PDA-RA) It checks requirements
Main Phases & Roles1. Previous analysis of the situation.2. System verification audit.3. System testing.4. Final interview and writing of the final report.
Roles: Audit client Security audit team Security manager
Related literatureBased on Requirement Engineering & CobiTCobiT: a framework to help organizations align
information technology with business goals (Ridley, Young & Carroll, 2004).
Requirements engineering:Developing requirementsAnalysing the problemDocumenting and observingChecking for accuracy.
Related literatureDownside RE:
Non-functional requirements.Requirements can conflict with each other.
You want high performance & You set a low budget.
Process Deliverable Diagram
Process Deliverable Diagram
Example