1 / 12

Agile Method Report

Agile Method Report. 黃盈積 982001524. 題目 : Integration Analysis of Security Activities from the perspective of agility 作者 : Sonia, Archana Singhal 會議 : Agile India 年份 : 2012. Outline. Background Proposed Approach Comparative Study and Evaluation Conclusion and Future Work. Background.

Télécharger la présentation

Agile Method Report

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Agile Method Report 黃盈積 982001524

  2. 題目: Integration Analysis of Security Activities from the perspective of agility • 作者: Sonia, ArchanaSinghal • 會議: Agile India • 年份: 2012

  3. Outline • Background • Proposed Approach • Comparative Study and Evaluation • Conclusion and Future Work

  4. Background • Agile Software development and agility • Overview of Security Activities

  5. Proposed Approach • Major attributes reflecting agility

  6. Proposed Approach • Computing agility degree for security activities • Once the values of all features have assigned their • weighting factor, the intermediate agility degree can be • computed as • (IAD)i=sum j from 1 to n (Wij* Aij) (1) • Where in (1), • (IAD)i is Intermediate Agility Degree of security activity i. • Aij is the agile value of attribute j of security activity i. • Wij is the weighting factor of attribute j of security activity i.

  7. Proposed Approach • CF (Calculated Factor) = 0.1M (2) • The calculated factor is shown in (2). Now multiplying • (1) and (2) we get real agility degree (RAD)i of security • activity i. • (RAD)i= sum j from 1 to n (Wij * Aij)* 0.1 M (3) • Finally (3) gives us the calculated value of RAD which • ranges from 0 to 15.8.

  8. Proposed Approach • Comparative analysis of security activities used for • integration with agile process • CASAF = RAD * RREF (4) • Table IV presents a comparative analysis of four • security activities. With this comparison we can make out • which security activity can be better integrated than other • with agile process. Now, we compare the results of • penetration testing activity with fuzz testing activity.

  9. Proposed Approach

  10. Comparative Study and Evaluation

  11. Conclusion and Future Work

  12. Thank you for your listening.

More Related