Skip to Main Content
Historically, it is well known that issues related to security of software applications are normally omitted by the development teams owing to a lack of expertise or knowledge in security policies. With the emergence of WEB 2.0 applications and technology many systems became to be ported from the original platform to the WEB, making the security flows became more serious. Entire systems, complex or not, have outstanding access availability and therefore are highly vulnerable to threats. This work aims to discuss how the security requirements should be elaborated in order to making easier the test execution team to elaborate the tests cases and consequently improving the quality of the solution developed.