requirements elicitation
Avoiding the Security Black Hole with Non-Functional Requirements Security vulnerabilities highlight the importance of the non-functional side of systems. Creating confident security starts by spending sufficient time eliciting and analyzing non-functional requirements. Adrian Reed explains how to avoid the security black hole with non-functional requirements. |