Security in Use Cases

Many efforts are being made to integrate security into software and software development. I lately read several interesting posts about the subject, two of them from Gunnar Peterson

Gunnar Peterson

In an IEEE Security & Privacy Journal he co-wrote an article on Misuse Cases with John Steven on Defining Misuse in the Development Process.

Here’s in short what is the core idea:

Use Cases vs Misuse Cases

I remembered having seen the idea before, as Richard Claassens, a former collegue and Architect at InfoSupport showed some examples that came from the original ideas behind Misuse Cases came from Guttorm Sindre and Andreas Opdahl.

Here’s a nice example:

Misuse Case diagram

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: