Asian Journal of Information Technology

Year: 2005
Volume: 4
Issue: 8
Page No. 784 - 789

System Security Requirements and Evaluation in Security Engineering

Authors : Eun-Ser Lee , Sun-myoung Hwang and Tai-hoon Kim

Abstract: The IT products like as firewall, Intrusion Detection System (IDS) and Virtual Private Network (VPN) which made to perform special functions related to security are used to supply security characteristics. But the method using these products may be not the perfect solution. Therefore, when making some kinds of software products, security-related requirements must be considered. It is essential that not only the customer’s requirements for software functionality should be satisfied but also the security requirements imposed on the software development should be effectively analyzed and implemented in contributing to the security objectives of customer’s requirements. The secure software may be implemented by not only applying Firewall or IDS but also considering security requirement appended to customer’s requirement. In this study we propose a security engineering based approach considering security when developing software.

How to cite this article:

Eun-Ser Lee , Sun-myoung Hwang and Tai-hoon Kim , 2005. System Security Requirements and Evaluation in Security Engineering . Asian Journal of Information Technology, 4: 784-789.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved