Security and Privacy Requirements Engineering

Security and Privacy Requirements Engineering

Nancy R. Mead (Carnegie Mellon University, USA) and Saeed Abu-Nimeh (Damballa Inc., USA)
Copyright: © 2015 |Pages: 17
DOI: 10.4018/978-1-4666-7381-6.ch010
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Security requirements engineering identifies security risks in software in the early stages of the development cycle. In this chapter, the authors present the SQUARE security requirements method. They integrate privacy requirements into SQUARE to identify privacy risks in addition to security risks. They then present a privacy elicitation technique and subsequently combine security risk assessment techniques with privacy risk assessment techniques. The authors discuss prototype tools that have been developed to support SQUARE for security and privacy as well as recent workshops that have focused on additional results in the security and privacy requirements area. Finally, the authors suggest future research and case studies needed to further contribute to early lifecycle activities that will address security and privacy-related issues.
Chapter Preview
Top

Introduction

Several initiatives have tried to standardize the processes of the software lifecycle, yet ISO/IEC 12207:2008 is considered the standard of software lifecycle processes (ISO/IEC 12207, 2008) by most. This standard divides software lifecycle processes into five high-level phases:

  • 1.

    Acquisition,

  • 2.

    Supply,

  • 3.

    Development,

  • 4.

    Operation, and

  • 5.

    Maintenance.

The acquisition phase concentrates on initiating the project. The supply phase concentrates on developing a project management plan. In the development phase, the software product is designed, created, and tested. In the operation phase, users start utilizing the product. Finally, in the maintenance phase, the product is maintained to stay operational.

Software requirements are discussed and addressed at an early stage in the software development phase. Requirements engineering concentrates on the real-world goals for, functions of, and constraints on software systems. In addition, it covers the relationship of these factors to precise specifications of software behavior and to their evolution over time and across software families (Zave, 1997).

Requirements elicitation in software development concentrates on functional and nonfunctional requirements. Functional or end-user requirements are the tasks that the system under development is expected to perform. Nonfunctional requirements are the qualities that the system must adhere to. Functional requirements are not as difficult to tackle, as it is easier to test their implementation in the system under development. Security and privacy requirements are considered nonfunctional requirements, although in many instances they do have functionality (Abu-Nimeh, Miyazaki, & Mead, 2009).

The Security Quality Requirements Engineering (SQUARE) method is used to identify software security issues in the early stages of the development lifecycle. In the following sections, we present the SQUARE method in detail and discuss the integration of privacy requirements into SQUARE.

It is essential to identify the security and privacy issues in a software risk assessment. Conducting a risk assessment is a step in a risk management process that involves the identification, assessment, and prioritization of risks related to a situation. A risk assessment determines, in a quantitative or qualitative way, the value of these risks. A security risk assessment identifies the threats to systems, while a privacy risk assessment identifies data sensitivities in systems. The SQUARE method relies on security risk assessment techniques to assess the levels of security risk in systems. However, these security risk assessment techniques are not adequate to address privacy risks. Therefore, we combine the security risk assessment techniques in the SQUARE method with privacy risk assessment techniques.

Key Terms in this Chapter

Threat Modeling: A process used to identify and document security risks (threats) to a system.

Requirements Engineering: A field that includes requirements identification, requirements analysis, requirements specification, requirements verification and validation, and requirements management.

Privacy Risk Assessment: A risk assessment that is specific to privacy concerns and has goals that relate to privacy policies and procedures.

Security Quality Requirements Engineering (SQUARE) Method: A method that generates categorized and prioritized security requirements following a nine-step process.

Security Requirements Engineering: A field that identifies security risks and mitigation strategies in the early stages of the system development cycle.

Security Risk Assessment: A risk assessment that is specific to security concerns and has goals that include the implementation of authentication and authorization systems.

HIPAA (Health Insurance Portability and Accountability Act): A U.S. law that addresses privacy concerns of health information systems by enforcing data exchange standards and providing a guideline for analyzing risks.

Risk Assessment: A step in a risk management process that involves the identification, assessment, and prioritization of risks related to a situation; thereby determining, in a quantitative or qualitative way, the value of the risks.

Complete Chapter List

Search this Book:
Reset