What are the SDLC Phases?
What is a Requirement?
Functional Requirements vs Quality Requirements
What is a Misuse Case?
Illegitimate/abnormal use of a system
Misuse Cases vs Abuse Cases
What are the Entities Introduced in a Misuse Case Diagram
What are the Relations Introduced in a Misuse Case Diagram
Characteristics of a Good Security Requirement
How are Risks Assessed?
Likelihood x Impact