Download presentation
Presentation is loading. Please wait.
Published byDulcie Rice Modified over 9 years ago
1
A Personal Data Audit Method through Requirements Engineering Thomas van Eerden
2
Authors Miguel A. Martínez Joaquín Lasheras Eduardo Fernández-Medina Ambrosio Toval Mario Piattini All an academic background in Spain
3
Introduction Method that systematizes audit information security systems. Focus: Sensitive data Health Information Systems Information from the Government (about you) Police reports Etc.
4
Name Personal Data Audit Method based on Requirements Engineering (PDA-RA) It checks requirements
5
Main Phases & Roles 1.Previous analysis of the situation. 2.System verification audit. 3.System testing. 4.Final interview and writing of the final report. Roles: Audit client Security audit team Security manager
6
Related literature Based on Requirement Engineering & CobiT CobiT: a framework to help organizations align information technology with business goals (Ridley, Young & Carroll, 2004). Requirements engineering: Developing requirements Analysing the problem Documenting and observing Checking for accuracy.
7
Related literature Downside RE: Non-functional requirements. Requirements can conflict with each other. You want high performance & You set a low budget.
8
Process Deliverable Diagram
10
Example
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.