Summary
This chapter introduced the secure, functional model. We looked at requirement gathering, including functional, non-functional, and constraints. Next, we looked at use and misuse scenarios, which were specific textual descriptions of interactions with a system. We followed up with a more formal and generalized version of the scenarios we call textual use and misuse cases. We graphically represented these use and misuse cases with UML diagrams. Lastly, we implemented our work into an example function model for an event ticketing system.
In the next chapter, we will look at building the object model to represent the internal structure of our application.