Requirements Management

Slides:



Advertisements
Similar presentations
Context Diagram Yong Choi BPA CSUB.
Advertisements

NSFdeposit.com Telephone Checks. NSFdeposit.com Telephone Checks New Automated On-line Payment System One time sign-up; intelligent engine Unique file.
09/04/2015Unit 2 (b) Back-Office processes Unit 2 Assessment Criteria (b) 10 marks.
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
Automated Payment System. Benefits There is minimal training needed No expensive equipment necessary You can maintain your existing banking relationship.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
Course Instructor: Aisha Azeem
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 6 Slide 1 Software Requirements 2.
Summary Maximo is an Enterprise Asset Management System used by Cornell University Facilities Services. Many of Cornell's physical assets found across.
J-ESS Tutorial W-4/VA-4 Tax Information Update. 2 J-Ess Tutorial – Enter JMU e-ID & Password Enter your JMU e-ID and Password Then click Sign In to log.
Web Application Security Implementation - © 2007 GIAC Web Application Security Implementation SANS MSISE GDWP Kevin Bong John Brozycki July 26, 2007.
CCRS Comprehensive Conference Registration System Detailed Design March 6 th,
Clients (and the interface level) Application Server (and the application level) Database Server (and the Database level)
Company Confidential Info Exchange Workflow Examples for External Users: Submittals Company Confidential.
A GENERIC PROCESS FOR REQUIREMENTS ENGINEERING Chapter 2 1 These slides are prepared by Enas Naffar to be used in Software requirements course - Philadelphia.
Student User Guide To ensure a quick and easy start to your course, check out the interactive, step-by-step MyMarketingLab Student Getting Started Guide.
Event Management & ITIL V3
Slide 12.1 Chapter 12 Implementation. Slide 12.2 Learning outcomes Produce a plan to minimize the risks involved with the launch phase of an e-business.
Electronic Assessment Management Sue Lee
1 Issues in Documenting Requirements Requirements are often poorly documented and become a source of risk Too vague, not specific enough, subject to too.
AR160 AR Reporting, Best Practices and Unit Responsibilities AR160 Accounts Receivable Reporting, Best Practices and Unit Responsibilities University of.
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
How to complete and submit a Final Report through
Advanced Higher Computing Science
SQL Database Management
Reply to Registration Invitation ( )
WEB TESTING
Session 6: Reports.
Inspecting Software Requirement Document
Development Environment
Classifications of Software Requirements
Database System Concepts and Architecture
UVOS and VOMS differences
Writing Requirements Lecture # 23.
Objectives Importance of Requirement Engineering
Section 17.1 Section 17.2 Add an audio file using HTML
Module 8: Securing Network Traffic by Using IPSec and Certificates
Requirements Management
Developing Information Systems
Requirements Management
Web Programming– UFCFB Lecture 17
Software Requirements
Software Requirements analysis & specifications
Online Testing System Assessment Viewing Application (AVA)
Requirements Management
Design by Contract Fall 2016 Version.
Victa, Charles Xue, Huan Tsang, Hubert.
Software Requirements Specification Document
Requirements Management
Lecture 2 - SQL Injection
Online Testing System Assessment Viewing Application (AVA)
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
Requirements Management
Security.
Chapter 4 Company Code Global Parameters
Module 8: Securing Network Traffic by Using IPSec and Certificates
Object-Oriented Software Engineering
Operating System Concepts
Chapter 5 Architectural Design.
AICT5 – eProject Project Planning for ICT
Operating System Concepts
Enterprise vs Small Business Editions
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Requirements Analysis
Office of University Bursar
MyBusinessLab First Day of Class Registration Walkthrough
Technology Maintenance
Fed-IP Assessor Training: Module 3 Assessing an application for Fed-IP
Presentation transcript:

Requirements Management Needs Statements to SRS Instructor Slides Exercise Module Number: RM11 This course material was developed with NSF – TUES award # 1245036

Some Terminology Needs Statement: SRS: Also known as problem statement, need statement, or needs assessment Statement of need establishes the focus and rationale of the requirement The statement of need is a concise and coherent statement SRS: Is a description of a software system to be developed. It lays out functional and non-functional requirements, and may include a set of use cases that describe user interactions that the software must provide.

Task Distinguish whether each of the following is a "needs" statement, or a software requirement specification (SRS). If it is a needs statement, discuss how we may proceed to re-work it into a SRS.

Needs Statement (for SRS) 1 All transactions must be properly logged to meet the requirements by law. What do the students say?

Needs Statement (for SRS) 1 All transactions must be properly logged to meet the requirements by law. Legitimate needs statement; we must then sort out the requirements by law to interpret in the system design, indicating the specific requirements in the software. Instructor: Transaction log keeps a record of each transaction, which is time-stamped (with locale info, if necessary), along with all parameter values in the transaction.

Needs Statement (for SRS) 2 In the occurrence of any one of the following events, the system must respond with alert notification within 10 seconds. What do the students say?

Needs Statement (for SRS) 2 In the occurrence of any one of the following events, the system must respond with alert notification within 10 seconds. SRS. We must also have the complete list of all the events to alert, and the details of each alert notification. Instructor: This is a legitimate performance requirement. Additional details needed to complete the specification.

Needs Statement (for SRS) 3 Payment transaction must be confirmed before initiating the download process. What do the students say?

Needs Statement (for SRS) 3 Payment transaction must be confirmed before initiating the download process. SRS. We must also have the complete list of all the events to alert, and the details of each alert notification. Instructor: Vendor system for the purchase of software product by download via the network.

Needs Statement (for SRS) 4 The user should be provided with various input options to complete the form, including guidance by a software wizard, but convenience for the user needs to be a high priority. What do the students say?

Needs Statement (for SRS) 4 The user should be provided with various input options to complete the form, including guidance by a software wizard, but convenience for the user needs to be a high priority. A needs statement. Must specify also all detailed information about the form to be filled. Ease of use is important, but the needs statement is unclear about the appropriate priority for the design of the "help wizard". Instructor: A common approach to make sophisticated software application also easy to sue. But for SRS, we need to specify all details. "Convenience for the user needs" is vague.

Needs Statement (for SRS) 5 Input data must be validated before submission to the server to defend against malicious intruder to the network. What do the students say?

Needs Statement (for SRS) 5 Input data must be validated before submission to the server to defend against malicious intruder to the network. A needs statement - not properly thought out. Input validation done on the client side is good to minimize unnecessary client/server traffic when input data is invalid - therefore more efficient and desirable. However, to defend against malicious intruder, a different approach of input validation must be done on the server side. Instructor: Students may need to be instructed about client/server system (such as the web). While for the sake of efficiency, input checking is done on the client side. But for security defense against malicious input, the validation must be done on the server side.

Questions