agile method report
DESCRIPTION
Agile Method Report. 黃盈積 982001524. 題目 : Integration Analysis of Security Activities from the perspective of agility 作者 : Sonia, Archana Singhal 會議 : Agile India 年份 : 2012. Outline. Background Proposed Approach Comparative Study and Evaluation Conclusion and Future Work. Background. - PowerPoint PPT PresentationTRANSCRIPT
Agile Method Report
黃盈積 982001524
• 題目 : Integration Analysis of Security Activities from the perspective of agility
• 作者 : Sonia, Archana Singhal• 會議 : Agile India• 年份 : 2012
Outline• Background• Proposed Approach• Comparative Study and Evaluation• Conclusion and Future Work
Background• Agile Software development and agility• Overview of Security Activities
Proposed Approach• Major attributes reflecting agility
Proposed Approach• Computing agility degree for security activities• Once the values of all features have assigned their• weighting factor, the intermediate agility degree can be• computed as• (IAD)i = sum j from 1 to n (Wij * Aij) (1)• Where in (1),• (IAD)i is Intermediate Agility Degree of security activity i.• Aij is the agile value of attribute j of security activity i.• Wij is the weighting factor of attribute j of security
activity i.
Proposed Approach• CF (Calculated Factor) = 0.1M (2)• The calculated factor is shown in (2). Now
multiplying• (1) and (2) we get real agility degree (RAD)i of
security• activity i.• (RAD)i = sum j from 1 to n (Wij * Aij)* 0.1 M
(3)• Finally (3) gives us the calculated value of RAD
which• ranges from 0 to 15.8.
Proposed Approach• Comparative analysis of security activities
used for• integration with agile process• CASAF = RAD * RREF (4)• Table IV presents a comparative analysis of four• security activities. With this comparison we can
make out• which security activity can be better integrated
than other• with agile process. Now, we compare the results
of• penetration testing activity with fuzz testing
activity.
Proposed Approach
Comparative Study and Evaluation
Conclusion and Future Work
• Thank you for your listening.