120 likes | 406 Views
Agile Method Report. 黃盈積 982001524. 題目 : Integration Analysis of Security Activities from the perspective of agility 作者 : Sonia, Archana Singhal 會議 : Agile India 年份 : 2012. Outline. Background Proposed Approach Comparative Study and Evaluation Conclusion and Future Work. Background.
E N D
Agile Method Report 黃盈積 982001524
題目: Integration Analysis of Security Activities from the perspective of agility • 作者: Sonia, ArchanaSinghal • 會議: Agile India • 年份: 2012
Outline • Background • Proposed Approach • Comparative Study and Evaluation • Conclusion and Future Work
Background • Agile Software development and agility • Overview of Security Activities
Proposed Approach • Major attributes reflecting agility
Proposed Approach • Computing agility degree for security activities • Once the values of all features have assigned their • weighting factor, the intermediate agility degree can be • computed as • (IAD)i=sum j from 1 to n (Wij* Aij) (1) • Where in (1), • (IAD)i is Intermediate Agility Degree of security activity i. • Aij is the agile value of attribute j of security activity i. • Wij is the weighting factor of attribute j of security activity i.
Proposed Approach • CF (Calculated Factor) = 0.1M (2) • The calculated factor is shown in (2). Now multiplying • (1) and (2) we get real agility degree (RAD)i of security • activity i. • (RAD)i= sum j from 1 to n (Wij * Aij)* 0.1 M (3) • Finally (3) gives us the calculated value of RAD which • ranges from 0 to 15.8.
Proposed Approach • Comparative analysis of security activities used for • integration with agile process • CASAF = RAD * RREF (4) • Table IV presents a comparative analysis of four • security activities. With this comparison we can make out • which security activity can be better integrated than other • with agile process. Now, we compare the results of • penetration testing activity with fuzz testing activity.