首页> 外文会议>POWID Symposium >Developing Security Requirements Without Developing an Ulcer
【24h】

Developing Security Requirements Without Developing an Ulcer

机译:在不开发溃疡的情况下开发安全要求

获取原文

摘要

For over 15 years the author has worked as a consultant in the field of cyber security. Much of that time has involved responding to RFIs, RFQs and RFPs with varying amounts of rigor when it comes to the requirements presented to responding vendors. And in most cases, the requirements have been confusing, inappropriate, or even counterproductive from the perspective of actually accomplishing security. And then, one day, the author had to come up with requirements himself...and it all made sense. He realized why requirements he had seen were typically so far off the mark, and suddenly had insight into the whole situation from end to end. The purpose of this paper is to delineate some of the causes for this and to offer helpful alternative approaches and methods towards the creation of appropriately detailed security requirements, so that those in the audience who have to come up with requirements will understand how they are consumed, and get some insight into the way that requirements are consumed as a source of guidance.
机译:超过15年,提交人作为网络安全领域的顾问工作。当涉及到响应供应商的要求时,大部分时间都涉及响应RFIS,RFQ和RFP,并在响应供应商提出的要求时具有不同的严谨性。在大多数情况下,从实际完成安全性的角度来看,要求令人困惑,不恰当,甚至适得其反。然后,有一天,提交人必须提出要求自己......这一切都是有道理的。他意识到为什么他所看到的要求通常如此远离标记,并且突然洞察从终到底的整个情况。本文的目的是对某些原因描绘其中的一些原因,并提供有用的替代方法和方法,以创造适当的详细安全要求,因此必须提出要求的观众中的人将理解它们的消费方式,并介绍了要求作为指导来源消耗的方式。

著录项

  • 来源
    《POWID Symposium 》|2013年||共3页
  • 会议地点
  • 作者

    Rob Shein;

  • 作者单位
  • 会议组织
  • 原文格式 PDF
  • 正文语种
  • 中图分类 TM623-53;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号