agile method report

12
Agile Method Report 黃黃黃 982001524

Upload: byron-santos

Post on 02-Jan-2016

41 views

Category:

Documents


2 download

DESCRIPTION

Agile Method Report. 黃盈積 982001524. 題目 : Integration Analysis of Security Activities from the perspective of agility 作者 : Sonia, Archana Singhal 會議 : Agile India 年份 : 2012. Outline. Background Proposed Approach Comparative Study and Evaluation Conclusion and Future Work. Background. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Agile Method Report

Agile Method Report

黃盈積 982001524

Page 2: Agile Method Report

• 題目 : Integration Analysis of Security Activities from the perspective of agility

• 作者 : Sonia, Archana Singhal• 會議 : Agile India• 年份 : 2012

Page 3: Agile Method Report

Outline• Background• Proposed Approach• Comparative Study and Evaluation• Conclusion and Future Work

Page 4: Agile Method Report

Background• Agile Software development and agility• Overview of Security Activities

Page 5: Agile Method Report

Proposed Approach• Major attributes reflecting agility

Page 6: Agile Method Report

Proposed Approach• Computing agility degree for security activities• Once the values of all features have assigned their• weighting factor, the intermediate agility degree can be• computed as• (IAD)i = sum j from 1 to n (Wij * Aij) (1)• Where in (1),• (IAD)i is Intermediate Agility Degree of security activity i.• Aij is the agile value of attribute j of security activity i.• Wij is the weighting factor of attribute j of security

activity i.

Page 7: Agile Method Report

Proposed Approach• CF (Calculated Factor) = 0.1M (2)• The calculated factor is shown in (2). Now

multiplying• (1) and (2) we get real agility degree (RAD)i of

security• activity i.• (RAD)i = sum j from 1 to n (Wij * Aij)* 0.1 M

(3)• Finally (3) gives us the calculated value of RAD

which• ranges from 0 to 15.8.

Page 8: Agile Method Report

Proposed Approach• Comparative analysis of security activities

used for• integration with agile process• CASAF = RAD * RREF (4)• Table IV presents a comparative analysis of four• security activities. With this comparison we can

make out• which security activity can be better integrated

than other• with agile process. Now, we compare the results

of• penetration testing activity with fuzz testing

activity.

Page 9: Agile Method Report

Proposed Approach

Page 10: Agile Method Report

Comparative Study and Evaluation

Page 11: Agile Method Report

Conclusion and Future Work

Page 12: Agile Method Report

• Thank you for your listening.