agile method report 黃盈積 982001524. 題目 : integration analysis of security activities from...

Post on 18-Jan-2016

220 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Agile Method Report

黃盈積 982001524

• 題目 : Integration Analysis of Security Activities from the perspective of agility

• 作者 : Sonia, Archana Singhal• 會議 : Agile India• 年份 : 2012

Outline• Background• Proposed Approach• Comparative Study and Evaluation• Conclusion and Future Work

Background• Agile Software development and agility• Overview of Security Activities

Proposed Approach• Major attributes reflecting agility

Proposed Approach• Computing agility degree for security activities• Once the values of all features have assigned their• weighting factor, the intermediate agility degree can be• computed as• (IAD)i = sum j from 1 to n (Wij * Aij) (1)• Where in (1),• (IAD)i is Intermediate Agility Degree of security activity i.• Aij is the agile value of attribute j of security activity i.• Wij is the weighting factor of attribute j of security

activity i.

Proposed Approach• CF (Calculated Factor) = 0.1M (2)• The calculated factor is shown in (2). Now

multiplying• (1) and (2) we get real agility degree (RAD)i of

security• activity i.• (RAD)i = sum j from 1 to n (Wij * Aij)* 0.1 M

(3)• Finally (3) gives us the calculated value of RAD

which• ranges from 0 to 15.8.

Proposed Approach• Comparative analysis of security activities

used for• integration with agile process• CASAF = RAD * RREF (4)• Table IV presents a comparative analysis of four• security activities. With this comparison we can

make out• which security activity can be better integrated

than other• with agile process. Now, we compare the results

of• penetration testing activity with fuzz testing

activity.

Proposed Approach

Comparative Study and Evaluation

Conclusion and Future Work

• Thank you for your listening.

top related