{"id":1208,"date":"2022-11-16T05:24:23","date_gmt":"2022-11-16T05:24:23","guid":{"rendered":"https:\/\/blog.thepragmatic.xyz\/?p=1208"},"modified":"2022-11-16T05:24:48","modified_gmt":"2022-11-16T05:24:48","slug":"casos-de-mal-uso-abuso","status":"publish","type":"post","link":"https:\/\/blog.thepragmatic.xyz\/?p=1208","title":{"rendered":"Casos de mal  uso\/abuso"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Requisitos de Negocio y casos de uso esperado<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Historias y \u00e9picas en metodolog\u00edas \u00e1giles<\/p>\n\n\n\n<ul><li>Iniciativas<\/li><li>Epicas<\/li><li>Historias<\/li><li>Tareas<\/li><li>Actividades o subtareas.<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>Casos de mal uso o abuso<\/p>\n\n\n\n<ul><li>Modelando los requisitos de seguridad<\/li><li>Historias enfocadas en seguridad<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Modelado de amenazas y superficie de ataque<\/p>\n\n\n\n<ul><li>CAPEC<\/li><li>ATT&amp;CK MITRE<\/li><li>CVE\/CWE\/CVSS<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>Referencias<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/rietta.com\/blog\/what-is-an-abuser-story-software\/\">https:\/\/rietta.com\/blog\/what-is-an-abuser-story-software\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Requisitos de Negocio y casos de uso esperado Historias y \u00e9picas en metodolog\u00edas \u00e1giles Iniciativas Epicas Historias Tareas Actividades o subtareas. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[24],"tags":[],"_links":{"self":[{"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=\/wp\/v2\/posts\/1208"}],"collection":[{"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1208"}],"version-history":[{"count":1,"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=\/wp\/v2\/posts\/1208\/revisions"}],"predecessor-version":[{"id":1211,"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=\/wp\/v2\/posts\/1208\/revisions\/1211"}],"wp:attachment":[{"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.thepragmatic.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}