Chapter 12 Designing System Interfaces, Controls, and Security

Slides:



Advertisements
Similar presentations
Chapter 10: The Traditional Approach to Design
Advertisements

Systems Analysis and Design in a Changing World, Fourth Edition
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Traditional Approach to Design
Chapter 10 The Traditional Approach to Design
Chapter 9: The Traditional Approach to Design Chapter 10 Systems Analysis and Design in a Changing World, 3 rd Edition.
Systems Analysis and Design in a Changing World, 6th Edition
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 10 Managing a Database.
14 Systems Analysis and Design in a Changing World, Fourth Edition.
Living in a Digital World Discovering Computers 2010.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System interfaces Updated: November 2014.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Systems Analysis and Design in a Changing World, 6th Edition
Systems Analysis and Design in a Changing World, 6th Edition
Systems Analysis and Design in a Changing World, 6th Edition
Systems Analysis and Design in a Changing World, 6th Edition
- Physical design of output reports and input forms
Designing Inputs, Outputs, and Controls
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Objectives Discuss examples of system interfaces found in information systems Define system inputs and outputs based on the requirements models of the.
Systems Analysis and Design in a Changing World, 6th Edition
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Discovering Computers Fundamentals, 2012 Edition Your Interactive Guide to the Digital World.
2 Object-Oriented Analysis and Design with the Unified Process Overview  Many System inputs and outputs do not require much human intervention  Electronic.
BUSINESS B1 Information Security.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
15 Chapter 15 Design System Interfaces, Controls, and Security Systems Analysis and Design in a Changing World, 5th Edition.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
System Analysis and Design
1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
10 ITK261 The traditional approach to design Reading: Chapter 10 Oct 9, 11.
10 The traditional approach to design Hisham Alkhawar.
Types of Electronic Infection
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe the qualities of valuable information.
Systems Analysis and Design in a Changing World, 3rd Edition
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
INFORMATION X INFO425: Systems Design Chapter 15 Designing System Interfaces, Security and Controls.
INFO 355Week #71 Systems Analysis II User and system interface design INFO 355 Glenn Booker.
University of Toronto at Scarborough © Kersti Wain-Bantin CSCC40 user dialogue 1 why good interface design? reduces input and usage errors lowers the cost.
1 User Interface Design Components Chapter Key Definitions The navigation mechanism provides the way for users to tell the system what to do The.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
1 Chapter 9 Database Management. Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe.
14 Systems Analysis and Design in a Changing World, Fourth Edition.
Information Systems Design and Development Security Precautions Computing Science.
Systems Analysis and Design in a Changing World, Fourth Edition
Securing Information Systems
INFORMATION SYSTEMS SECURITY AND CONTROL.
Chapter 11 Designing Inputs, Outputs, and Controls.
Controlling Computer-Based Information Systems, Part II
Chapter Ten Managing a Database.
Guidelines for designing Windows and Forms
Systems Design Chapter 6.
ONLINE SECURE DATA SERVICE
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Chapter 12 Designing System Interfaces, Controls, and Security Systems Analysis and Design in a Changing World, 3rd Edition

Identifying System Interfaces Systems interfaces are broadly defined as inputs or outputs with minimal or no human intervention Inputs from other systems (messages, EDI) Highly automated input devices such as scanners Inputs that are from data in external databases Outputs that are to external databases Outputs with minimal HCI Outputs to other systems Real-time connections (both input and output)

Full Range of Inputs and Outputs

eXtensible Markup Language (XML) Extension of HTML that embeds self-defined data structures within textual messages Transaction that contains data fields can be sent with XML codes to define meaning of data fields XML provides common system-to-system interface XML is simple and readable by people Web services is based on XML to send business transactions over Internet

System-to-System Interface Based on XML

Design of System Inputs Identify devices and mechanisms used to enter input High-level review of most up-to-date methods to enter data Identify all system inputs and develop list of data content with each Provides link between design of application software and design of user and system interfaces Determine controls and security necessary for each system input

Input Devices and Mechanisms Capture data as close to origination source as possible Use electronic devices and automatic entry whenever possible Avoid human involvement as much as possible Seek information in electronic form to avoid data reentry Validate and correct information at entry point

Prevalent Input Devices to Avoid Human Data Entry Magnetic card strip readers Bar-code readers Optical character recognition readers and scanners Touch screens and devices Electronic pens and writing surfaces Digitizers, such as digital cameras and digital audio devices

Defining the Details of System Inputs Ensure all data inputs are identified and specified correctly Can use traditional structured models Identify automation boundary Use DFD fragments Segment by program boundaries Examine Structure Charts Analyze each module and data couple List individual data fields

Automation Boundary on a System-level DFD

Create New Order DFD with an Automation Boundary

List of Inputs for Customer Support System

Structure Chart for Create New Order

Data Flows, Data Couples, and Data Elements Making up Inputs

Using Object-Oriented Models Identifying user and system inputs with OO approach has same tasks as traditional approach OO diagrams are used instead of DFDs and structure charts System sequence diagrams identify each incoming message Design class diagrams identify and describe input parameters and contain pseudocode to verify characteristics of inputs

Partial System Sequence Diagram for Payroll System Use Cases

System Sequence Diagram for Create New Order

Input Messages and Data Parameters from RMO System Sequence Diagram

Designing System Outputs Determine each type of output Make list of specific system outputs required based on application design Specify any necessary controls to protect information provided in output Design and prototype output layout Ad hoc reports – designed as needed by user

Defining the Details of System Outputs Type of reports Printed reports Electronic displays Turnaround documents May use traditional structured models to identify outputs Data flows crossing automation boundary Data couples and report data requirements on structure chart

Table of System Outputs Based on Traditional Structured Approach

Using Object-Oriented Models Outputs indicated by messages in sequence diagrams Originate from internal system objects Sent to external actors or another external system Output messages based on an individual object are usually part of methods of that class object To report on all objects within a class, class-level method is used that works on entire class

Table of System Outputs Based on OO Messages

Designing Reports, Statements, and Turnaround Documents Printed versus electronic Type of output reports Detailed Summary Exception Executive Internal versus external Graphical and multimedia presentation

RMO Summary Report with Drill Down to the Detailed Report

Sample Bar Chart and Pie Chart Reports

Formatting Reports What is objective of report? Who is the intended audience? What is media for presentation? Avoid information overload Format considerations such as meaningful headings, date of information, date report produced, page numbers

Designing Integrity Controls Mechanisms and procedures built into a system to safeguard it and information contained within Integrity controls Built into application and database system to safeguard information Security controls Built into operating system and network

Objectives of Integrity Controls Ensure that only appropriate and correct business transactions occur Ensure that transactions are recorded and processed correctly Protect and safeguard assets of the organization Software Hardware Information

Points of Security and Integrity Controls

Input Integrity Controls Used with all input mechanisms Additional level of verification to help reduce input errors Common control techniques Field combination controls Value limit controls Completeness controls Data validation controls

Database Integrity Controls Access control Data encryption Transaction control Update control Backup and recovery protection

Output Integrity Controls Ensures output arrives at proper destination and is correct, accurate, complete, and current Destination controls - output is channeled to correct people Completeness, accuracy, and correctness controls Appropriate information present on output

Integrity Controls to Prevent Fraud Three conditions are present in fraud cases Personal pressure, such as desire to maintain extravagant lifestyle Rationalization, such as person’s thoughts that “I will repay this money” Opportunity, such as unverified cash receipts Control of fraud requires both manual procedures and computer integrity controls

Fraud Risks and Prevention Techniques

Designing Security Controls Security controls protect assets of organization from all threats External threats such as hackers, viruses, worms, and message overload attacks Security control objectives Maintain stable, functioning operating environment for users and application systems (24 x 7) Protect information and transactions during transmission outside organization (public carriers)

Security for Access to Systems Used to control access to any resource managed by operating system or network User categories Unauthorized user – no authorization to access Registered user – authorized to access system Privileged user – authorized to administrate system Organized so that all resources can be accessed with same unique ID/password combination

Users and Access Roles to Computer Systems

Managing User Access Most common technique is user ID / password Authorization – Is user permitted to access? Access control list – users with rights to access Authentication – Is user who they claim to be? Smart card – computer readable plastic card with embedded security information Biometric devices – keystroke patterns, fingerprint, retinal scans, voice characteristics

Data Security Data and files themselves must be secure Encryption – primary security method Altering data so unauthorized users cannot view Decryption Altering encrypted data back to original state Symmetric key – same key encrypts and decrypts Asymmetric key – different key decrypts Public key – public encrypts, private decrypts

Symmetric Key Encryption

Asymmetric Key Encryption

Digital signatures and certificates Encryption of messages enables secure exchange of information between two entities with appropriate keys Digital signature encrypts document with private key to verify document author Digital certificate is institution’s name and public key that is encrypted and certified by third party Certifying authority Verisign or Equifax

Using a Digital Certificate

Secure Transactions Standard set of methods and protocols for authentication, authorization, privacy, integrity Secure Sockets Layer (SSL) renamed as Transport Layer Security (TLS) – protocol for secure channel to send messages over Internet IP Security (IPSec) – newer standard for secure Internet message transmission Secure Hypertext Transport Protocol (HTTPS or HTTP-S) – standard for transmitting Web pages securely (encryption, digital signing, certificates)

Summary System interfaces all inputs/outputs except (GUI) Designing inputs to system is three-step process Identify devices/mechanisms used to enter input Identify system inputs, develop list of data content Determine controls and security necessary for each system input Traditional approach to design inputs and outputs DFDs, data flow definitions, structure charts

Summary (continued) OO approach to design inputs and outputs Sequence diagrams, class diagrams, DFDs Integrity controls and security designed into system Only appropriate and correct business transactions occur Transactions are recorded and processed correctly Protect and safeguard assets of the organization Control access to resources