Главная
Study mode:
on
1
Introduction
2
Critical
3
Scalability
4
Use Cases
5
Demo
6
Security Requirements
7
Creating A Ticket
8
Exporting Ticket
9
Ticket Status
10
Create Slides
11
Updating Requirements
12
Updating Artifacts
13
Saving Changes
14
Data Security
15
External Company
16
Requirements in Database
17
J Hipster
18
Database Scheme
19
Skeletons
20
Option columns
21
Status columns
22
Implementation type
23
Filtering requirements
24
Authentication
25
Roles
26
Gyro Integration
27
Current State
28
Requirements
29
Security Rev
Description:
Explore a comprehensive presentation on integrating security requirements into the software development lifecycle, delivered by Daniel Kefer and René Reuter at the Netherlands OWASP Chapter Meeting. Learn about critical scalability issues, practical use cases, and witness a live demo of creating and managing security tickets. Discover techniques for exporting tickets, updating requirements, and ensuring data security. Delve into database schemes, authentication roles, and the integration of security requirements with tools like J Hipster. Gain insights into the current state of security requirements implementation and future developments in this crucial aspect of software engineering.

Handling of Security Requirements in Software Development Lifecycle

Cooper
Add to list