![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Requirement Engineering Concepts in Risk Analysis
Subscribe/Renew Journal
From the olden days to till date risk has always played a very important role and is therefore very much needed to be given importance. Risk refers to the protection of product from Interception, Fabrication, Modification and Interruption. Active attacks and passive attacks create awoke in final software product. The solution to this problem is to take care of risk from the initial stages of any product development. The first stage of any System development is the Requirement’s engineering process. In requirement engineering domain, Risk analysis, Risk management and Risk assessment is the most effective tool because it helps us to compare requirements and cost of risk measures. In this paper we have pointed out the need to introduce risk analysis issues in the requirement engineering process. The focus of this paper is to suggest some methods and tools which will understand risk from the early stages of information system development.
Keywords
Risk, Threat, Requirement Engineering, Vulnerability.
User
Subscription
Login to verify subscription
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 229
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 4