I think the key here is to focus on how abuse cases can help identify security requirements. Misuse cases seems like the most logical choice based on that. But I'll double-check my notes just to be sure.
Data flow diagram? I'm not sure how that would be derived from abuse cases. Seems like a bit of a stretch. I'm leaning more towards Misuse cases or Security use cases.
Security use cases seems like a good option. If we look at how the system can be abused, we can then define security requirements to prevent those abuses.
Hmm, I'm not sure about this one. I know abuse cases are related to security, but I'm not confident that Misuse cases is the right answer. I'll have to think about it more.
I'm going to go with B) Data flow diagram. That's the only option that seems completely unrelated to the question, so it must be the wrong answer. A little humor never hurts, right?
Wilburn
3 months agoOliva
3 months agoGianna
3 months agoNikita
4 months agoMaia
4 months agoFernanda
4 months agoShenika
4 months agoRefugia
4 months agoGalen
5 months agoJulie
5 months agoKent
5 months agoJonelle
5 months agoGeorgene
5 months agoShawna
5 months agoTalia
10 months agoFernanda
9 months agoWillard
9 months agoDaron
10 months agoLashandra
10 months agoLindsey
8 months agoJesse
8 months agoArminda
9 months agoJose
9 months agoMichael
10 months agoAmie
10 months agoCassi
10 months agoLorean
11 months agoAilene
11 months agoTyisha
10 months agoCharlette
10 months agoChun
10 months agoElouise
10 months agoSarina
11 months ago