files/journal/2022-09-02_11-59-20-000000_418.png

Asian Journal of Information Technology

ISSN: Online 1993-5994
ISSN: Print 1682-3915
125
Views
1
Downloads

System Security Requirements and Evaluation in Security Engineering

Eun-Ser Lee , Sun-myoung Hwang and Tai-hoon Kim
Page: 784-789 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

The IT products like as firewall, Intrusion Detection System (IDS) and Virtual Private Network (VPN) which made to perform special functions related to security are used to supply security characteristics. But the method using these products may be not the perfect solution. Therefore, when making some kinds of software products, security-related requirements must be considered. It is essential that not only the customer’s requirements for software functionality should be satisfied but also the security requirements imposed on the software development should be effectively analyzed and implemented in contributing to the security objectives of customer’s requirements. The secure software may be implemented by not only applying Firewall or IDS but also considering security requirement appended to customer’s requirement. In this study we propose a security engineering based approach considering security when developing software.


How to cite this article:

Eun-Ser Lee , Sun-myoung Hwang and Tai-hoon Kim . System Security Requirements and Evaluation in Security Engineering.
DOI: https://doi.org/10.36478/ajit.2005.784.789
URL: https://www.makhillpublications.co/view-article/1682-3915/ajit.2005.784.789