header
Image from OpenLibrary

An integrative study of selected information security techniques in ISO/IEC and CMMI-DEV standards / Inas Abdelmonem Abbas ; Supervised Hesham Hefny , Abdelaziz A. Abdelaziz

By: Contributor(s): Material type: TextTextLanguage: English Publication details: Cairo : Inas Abdelmonem Abbas , 2018Description: 140 Leaves : charts , facsimiles ; 30cmOther title:
  • ISO27001 & CMMI-DEV دراسة تكاملية فى بعض التقنيات المختارة من معايير تأمين المعلومات في [Added title page title]
Subject(s): Available additional physical forms:
  • Issued also as CD
Dissertation note: Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Researches - Department of Computer and Information Science Summary: In recent years, the security objective started to become a very important issue in any software project to the degree that lack of the security factor might lead to the whole project{u2019}s failure. Therefore, many studies were conducted to discuss the best ways to mitigate risks that can threaten any software project. However, most of the studies conducted in that area have analyzed the software risks from a very high level, and little of them has subjected to specific areas like the Security Requirements Engineering (SRE) risks. Even those who subjected to that area have discussed only one side of the security requirements in the software (e.g. password requirements) but they neglected the security in the requirements engineering process itself (e.g., how the requirements gathered, analyzed and documented in a secure manner). Hence, the security objective still lacks to one important side that can threaten the information security objective of the project
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Call number Copy number Status Date due Barcode
Thesis Thesis قاعة الرسائل الجامعية - الدور الاول المكتبة المركزبة الجديدة - جامعة القاهرة Cai01.18.02.M.Sc.2018.In.I (Browse shelf(Opens below)) Not for loan 01010110078231000
CD - Rom CD - Rom مخـــزن الرســائل الجـــامعية - البدروم المكتبة المركزبة الجديدة - جامعة القاهرة Cai01.18.02.M.Sc.2018.In.I (Browse shelf(Opens below)) 78231.CD Not for loan 01020110078231000

Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Researches - Department of Computer and Information Science

In recent years, the security objective started to become a very important issue in any software project to the degree that lack of the security factor might lead to the whole project{u2019}s failure. Therefore, many studies were conducted to discuss the best ways to mitigate risks that can threaten any software project. However, most of the studies conducted in that area have analyzed the software risks from a very high level, and little of them has subjected to specific areas like the Security Requirements Engineering (SRE) risks. Even those who subjected to that area have discussed only one side of the security requirements in the software (e.g. password requirements) but they neglected the security in the requirements engineering process itself (e.g., how the requirements gathered, analyzed and documented in a secure manner). Hence, the security objective still lacks to one important side that can threaten the information security objective of the project

Issued also as CD

There are no comments on this title.

to post a comment.