I think the key here is to focus on how abuse cases can help identify security requirements. Misuse cases seems like the most logical choice based on that. But I'll double-check my notes just to be sure.
Data flow diagram? I'm not sure how that would be derived from abuse cases. Seems like a bit of a stretch. I'm leaning more towards Misuse cases or Security use cases.
Security use cases seems like a good option. If we look at how the system can be abused, we can then define security requirements to prevent those abuses.
Hmm, I'm not sure about this one. I know abuse cases are related to security, but I'm not confident that Misuse cases is the right answer. I'll have to think about it more.
I'm going to go with B) Data flow diagram. That's the only option that seems completely unrelated to the question, so it must be the wrong answer. A little humor never hurts, right?
Wilburn
4 months agoOliva
5 months agoGianna
5 months agoNikita
5 months agoMaia
5 months agoFernanda
6 months agoShenika
6 months agoRefugia
6 months agoGalen
6 months agoJulie
6 months agoKent
6 months agoJonelle
6 months agoGeorgene
6 months agoShawna
6 months agoTalia
11 months agoFernanda
10 months agoWillard
11 months agoDaron
11 months agoLashandra
12 months agoLindsey
10 months agoJesse
10 months agoArminda
10 months agoJose
10 months agoMichael
12 months agoAmie
12 months agoCassi
12 months agoLorean
1 year agoAilene
1 year agoTyisha
11 months agoCharlette
11 months agoChun
11 months agoElouise
12 months agoSarina
1 year ago