• Identifying security requirements
  • Integrating security into the SDLC
  • Tools and techniques for requirement analysis