Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

Similar presentations


Presentation on theme: "A Personal Data Audit Method through Requirements Engineering Thomas van Eerden."— Presentation transcript:

1 A Personal Data Audit Method through Requirements Engineering Thomas van Eerden

2 Authors Miguel A. Martínez Joaquín Lasheras Eduardo Fernández-Medina Ambrosio Toval Mario Piattini All an academic background in Spain

3 Introduction Method that systematizes audit information security systems. Focus: Sensitive data Health Information Systems Information from the Government (about you) Police reports Etc.

4 Name Personal Data Audit Method based on Requirements Engineering (PDA-RA) It checks requirements

5 Main Phases & Roles 1.Previous analysis of the situation. 2.System verification audit. 3.System testing. 4.Final interview and writing of the final report. Roles: Audit client Security audit team Security manager

6 Related literature Based on Requirement Engineering & CobiT CobiT: a framework to help organizations align information technology with business goals (Ridley, Young & Carroll, 2004). Requirements engineering: Developing requirements Analysing the problem Documenting and observing Checking for accuracy.

7 Related literature Downside RE: Non-functional requirements. Requirements can conflict with each other. You want high performance & You set a low budget.

8 Process Deliverable Diagram

9

10 Example


Download ppt "A Personal Data Audit Method through Requirements Engineering Thomas van Eerden."

Similar presentations


Ads by Google