The stakeholders of a software company have four new security requirements that they are considering including in the next release of their flagship product: Two-factor authentication (2FA), Captcha for Bot Detection (CBT), Password Expirations (PEX), and Role-base access control (RBA). Given the time constraints, they may not be able to include all, so they need to prioritize these requirements based on three criteria: Maintainability (MA), Ease of Use (EU), and Integration Support (IS). They have the following pairwise preferences of the criteria: Maintainability is three times as important as Ease of Use Ease of Use is two times as important as Integration Support Maintainability is five times as important as Integration Support Based on the above information, do the following: Rank the four security requirements using the criteria weights and the following alternatives matrix: MA EU IS 2FA 0.36 0.29 0.09 CBT 0.13 0.33 0.18 PEX 0.27 0.21 0.40 RBA 0.24 0.17 0.33
The stakeholders of a software company have four new security requirements that they are considering including in the next release of their flagship product: Two-factor authentication (2FA), Captcha for Bot Detection (CBT), Password Expirations (PEX), and Role-base access control (RBA).
Given the time constraints, they may not be able to include all, so they need to prioritize these requirements based on three criteria: Maintainability (MA), Ease of Use (EU), and Integration Support (IS). They have the following pairwise preferences of the criteria:
- Maintainability is three times as important as Ease of Use
- Ease of Use is two times as important as Integration Support
- Maintainability is five times as important as Integration Support
Based on the above information, do the following:
- Rank the four security requirements using the criteria weights and the following alternatives matrix:
MA |
EU |
IS |
|
2FA |
0.36 |
0.29 |
0.09 |
CBT |
0.13 |
0.33 |
0.18 |
PEX |
0.27 |
0.21 |
0.40 |
RBA |
0.24 |
0.17 |
0.33 |
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 5 images