Non Functional Requirements Flashcards
Statements of services the system should provide, how the system react to particular inputs, and how the system should behave in particular situations
Functional Requirements
CONSTRAINTS on the services / functions offered by the system often AS A WHOLE
Non-functional requirement
What are usually included in the nonfunctional requirements
Time
Development process
Standards
Classification of NFR
NFR >PRODUCT >>USABILITY >>SECURITY >>EFFICIENCY >>>SPACE >>>PERFORMANCE >>DEPENDABILITY
> ORGANIZATIONAL
>DEVELOPMENTAL
>OPERATIONAL
>ENVIRONMENTAL
>EXTERNAL >>REGULATORY >>ETHICAL >>LEGISLATIVE >>>ACCOUNTING >>>SAFERY/SECURITY
Requirements that specify / constraints the behavior of the software
Product requirements
System requirements derived from POLICIES AND PROCEDURES in the customer / developer’s organization
Organizational requirements
Requirements derived from FACTORS EXTRERNAL TO THE SYSTEM AND ITS DEVELOPMENT PROCESS
External requirements
Requirement which imposes constraints on the TYPE of systems to interface and communicate with
Requirement which imposes some dependability on the proper SPECIFICATIONS and implementation
EG: Must be able to interface with all printers manufactured by company X
Interoperability
Requirement which imposes constraints related to the ease with which the software can be fixed, adapted to new environments and technologies, or expanded
Eg: can be easily fixed, updated by an IT personnel with minimal networking and unix prog bg
Maintainability
Requirement which imposes constraints on the physical and logical ENVIRONMENT in which the software OPERATES
Can include what environment the servers are located, min speed of network connections & OS
EG: The system will be run in any linux distro with internet bandwidth connection of 100Mbps in dry office room
Operability
Requirement which imposes constraints on RESPONSE TIME DELAYS, THROUGHPUT, AND MEMORY REQUIREMENTS
Eg: the finalized schedule use case should be able to process at least 500 concurrent users within a span of 5 secs
Performance
Response time delays can be either __ or ___
System wide ; use case specific
Puts lower bounds on the acceptable rate of completed transactions
Throughput requirement
Requirement which imposes conditions related to future deployment and evolution of the software
Ease with which a software can be made to run on different platforms/ software environments
Eg: system should be able to work in windows / linux env
Portability
Requirement which imposes values related to reliability of software under development which inclue MEAN TIME BETWEEN FAILURES or MAX TIME ALLOWED FOR FAILURES over a period of time
Cna be used to impose upper limit of down time of software
Eg: system must be available 99% of the time
Reliability and availability
Requirement which imposes constraints on the development of system related to the degree of REUSE
EG: System components should be designed and implemented in a way that they can be reused by other modules
Reusability
What are the two types of reuse?
> produce softwareFASTER by REUSING EXISTING COMPONENTS
> produce HIGHLY MAINTAINABLE software so it can be reused
Requirement which imposes constraints related to the way the software handles abnormal / erroneous inputs and operational conditions
Address software behaviour with respect to ERROR RECOVERY AND FAULT TOLERANCE
EG: system should be able to handle abnormal conditions and unexpected user inputs coming from the user and must recover from power failures and continue operating without any side effect on currently executing transactions
Robust
Needed when software deals with safety CRITICAL ISSUES such as aviation, power and chemical plant controls
Addresses enforcement of SAFETY STANDARDS
EG: in the case of software failure, a software procedure must be activated immediately
Safety
Imposes constrains on how the software system should scale up to a high input load at all interface
Ideally QUANITIFIABLE and are normally VERIFIED during LOAD TESTING
Eg: system must be able to accomodate max of 100 users logged on and performing all types of transactions
Scalabiltiy
A requirement that is very critical and must be identified earlier in the software development process
Security
4 main types of security concerns addressed by the security requirement
Confidentiality Integrity Availability Accountability (CIAA)
What are imposed to deal with security requirement?
(IAA) identification, authentication, authorization Integrity Immunity Privacy Non repudiation Survivability Physical protection Security standards conformity
IAA requirements are used to address __
Physical protection requirement addresses this in a physical level
Confidentiality concerns
Requirement wherein the software shall allow a registered user to have control over its own private info
Privacy requirements
Requirement wherein no files can be attached to a user profile without being disinfected by the software
Immunity requirement
Immunity and privacy requirements are used to address what type of concerns?
Integrity concerns
Access control related requirements
CONCERN - REQ
Integrity - privacy & immunity
Availability - survivability & physical protection
Accountability - non-repudiation and standards conformity
Requirement wherein system preserves tamper proof records
Non repudiation
IAA req is considered by introducinga logon use case called __-
Security use case
Abnormal behavior of an attacker
Misuse case
Elicited by firts knowing INTENDED USERS AND BACKGROUND
Eg: software must be easy tonuse by 7-9 old children
Usability
Constraints in user experience when interacting with the software
User friendliness