requirements elicitation

Avoiding the Security Black Hole with Non-Functional Requirements

Security vulnerabilities highlight the importance of the non-functional side of systems. Creating confident security starts by spending sufficient time eliciting and analyzing non-functional requirements. Adrian Reed explains how to avoid the security black hole with non-functional requirements.

Adrian Reed's picture
Adrian Reed