New method ensures vital information stays safe from cyber threats!
The article discusses how to identify important security requirements from a set of functional requirements in software development. The researchers suggest using a fuzzy-based method to select security requirements based on the preferences of stakeholders and the importance of security. This approach helps in ensuring that only the most crucial security measures are implemented to protect valuable information from unauthorized access. The researchers demonstrate the applicability of their method through an example.