Requirements Engineering Processes Flashcards

1
Q

Requirements Engineering Processes

A

To help create and maintain a system requirements document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Requirements Elicitation

A

What services to the end-users require of the system?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Requirements Analysis

A

How do we classify, prioritise and negotiate requirements?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Requirements Validation

A

Does the proposed system do what the users require?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Requirements Management

A

How do we manage the changes to the requirements document?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Feasibility Study

A

Decides whether or not the proposed system is worthwhile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does feasibility study check?

A
  • system contribution to organisational objectives
  • if the system can be engineered using current tech/budget
  • if the system can be integrated with other systems that are used
  • is there a simpler way of doing this?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Staffing for requirement analysis and elicitation…

A

Involves working with technical staff to find out about application domain, services and constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Problems with analysis and elicitation

A
  • stakeholders do not know what they want
  • stakeholders express requirements in their own terminology.
  • conflicting requirements between stakeholders
  • the domain/political factors may effect the requirements (data protection)
  • requirements are subject to change
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Requirements Discovery

A

Process of gathering information about proposed and existing systems and distilling user and system requirements from this information (source of info could include documentation, system stakeholders, specifications of other systems etc).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Requirements typically come from…

A
  • Copying and modifying requirements from other systems
  • Copying and fixing requirements of legacy system
  • Looking at competitors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Prototyping

A

Requirement are also discovered from protypes, therefore the initial requirements are thin since they are discovered from improving prototypes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Viewpoints

A

Structures the requirements to represent the perspectives from different stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of interviews

A

Closed Interview -> pre-defined set of questions are answered
Open Interview -> no pre-defined agenda, and range of issues are explored with stakeholder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ethnography

A

A social scientist spends time observing and analysing how people ACTUALLY work in the workplace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Focused Ethnography

A

Combines ethnography with prototyping, with prototype development resulting in unanswered questions which focus the ethnographic analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Scope of Ethnography

A

Derive requirements from how people work compared how we presume they work.

15
Q

Security Requirements (4 main issues)

A
  • Confidentiality
  • Integrity
  • Authentication and Authorisation
  • Non-repudiation
    (BONUS: availability)
16
Q

Confidentiality Requirements (hard/soft security and how data is kept secure)

A

Hard security -> encryption
Soft security -> permissions
Data is kept secure either in storage or on the wire/wireless link for as long as reasonably possible

17
Q

Integrity Requirements

A

Messages or data must not be modified without knowledge of the change.

18
Q

How to check for integrity

A
  • CRC checking (not really that good however, easy to forge the check value)
  • Hash value over data (similar issue to CRC however)
  • Hash value over data + secret value (key distribution problem, have to constantly exchange the key somehow)
  • Hash value encrypted using asymmetric cipher (best approach to date, see public key infrastructure)
19
Q

Authentication and Authorisation Requirements

A

Usernames and passwords, verification etc

20
Q

Non-repudiation Requirements

A

Ensures nobody can deny origin or authenticity of a message/some way of communication.

21
Q

How to check for non-repudiation

A
  • trusted broker, third party
  • Funding in Escrow (funding into a trusted back etc)
22
Q

Availability Requirements

A

High availability of the system.

23
Q

9s Terminology

A

s

24
Q

Standard Log

A

Records all logins/logouts as well as database access requests

25
Q

Failed Login

A

Record of all failed login attempts

26
Q

Unusual Activity Log

A

High volume transactions on account

27
Q

Alter Log

A

Failed attempt for top level clearance users

28
Q

Bell-LaPadula Model

A

All items are given a security clearance, and whatever security clearance level you are in is the one you only have permission to. There are certain circumstances that you could possibly read-down (read items from a previous security level, aka less important documents) but that it only for trusted subjects.

29
Q

Duration for specifying the security

A

Should be kept open as long as possible for upgrading encryption and protocols.

30
Q

Security Policy list (how to dispose of information etc)

A
  • Shredding documents
  • Secure disposal
  • Password reset protocols
  • Security training
  • Security Audits
31
Q

Validity

A

Does the system provide the functions which support customer needs?

32
Q

Consistency

A

Are there any requirement conflicts?

33
Q

Completeness

A

Are all functions by the customer included?

34
Q

Realism

A

Can the requirements be implemented given the available budget and tech?

35
Q

Verifiability

A

Can the requirements be checked?

36
Q

Scenarios

A

Test cases running in a given situation, allowing developers to see the outcome and improve on it, allowing the test to be used as a basis for the software testing.

37
Q

Agile Requirement Tool Example

A

Cucumber
Used to help write requirements which are directly linked to tests.
Uses a language called Gherkin which describes features.
Gives clear notation to write specification.
Test team and customers can learn Gherkin.
Step files are produced by development team.
Test data can be changed later without changing test code.