Which 3 quality attributes compose security?
From where comes the prioritization of quality attributes?
from the client
SW engineer and requirement engineer must take this information from him
How are quality attributes achieved?
- design & implementation choices.
What is used to achieve quality attributes?
architectural patterns