• CRITICALLY, you need to link your artefact requirements to your literature review
    • If your artefact involves web security then your requirements must incorporate web security features which you have discussed in your literature review
    • For example, I discussed authorisation attacks in my literature review and highlighted some key prevention measures which I will now list in my requirements: my login function may look like this:


Module: Authenticate

ID Priority Function Requirement Constraints
FR_1 1 Check username and password Username
  • Must match an email address
  • Must >8 digits and <20 digits
  • Must have a mix of letter and numbers
5 (100%) 1 vote

    Comments are closed.