Please enable JavaScript.
Coggle requires JavaScript to display documents.
(Security (82) (Concerns (Principals, Resources, Policies, Threats,…
Security (82)
Concerns
Principals
Resources
Policies
Threats
Detection and recovery
Confidentiality
Integrity
Availability
Accountability
Security Controls
Authentication
Integrity
Confidentiality
Non-repudiation
risk management
usability
security
Viewpoint
Perspective
View
Deployment Viewpoint (75)
Key Concepts
Deployment Unit
Location
Connection
Zone
Node
Operational Model
Logical
Physical
Walkthroughs
Operational Modelling
Physical Location Model
Physical Operational Model (Unsized)
Logical Operational Model
Physical Operational Model (Sized)
Logical Location Model
Evaluation
basic questions
who
what
when
how
why
ATAM (Architecture Tradeoff Analysis Method)
Scenario-based analysis
Viability Assessment
Scenarios
Requirements (74)
types
functional
user
system
non-functional
system qualities
performance
availability
future
artefacts
use cases
business process models
development process
SC,AO,AD (35)
System Context
Black Box
Actors
Human
System
Architecture Overview
Building blocks
Architectural Decisions
Important decisions during development
Performance (39)
aspects
throughput
capacity
response time
Performance model
Functional Viewpoint (59)
Component Model
Static
Component Relationship Diagram
Layers
Dynamic
Component Interaction Diagram
Sequence Diagram
Bridge the gap between requirements and the solution
Component Modelling
Component Specification
Component Realisation
Component Identification