1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.

Slides:



Advertisements
Similar presentations
Module 3: Business Information Systems
Advertisements

Systems Analysis and Design in a Changing World, Fourth Edition
Chapter 12 Designing System Interfaces, Controls, and Security
Chapter 10 The Traditional Approach to Design
Chapter 9: The Traditional Approach to Design Chapter 10 Systems Analysis and Design in a Changing World, 3 rd Edition.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Systems Analysis and Design in a Changing World, 6th Edition
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 10 Managing a Database.
14 Systems Analysis and Design in a Changing World, Fourth Edition.
Living in a Digital World Discovering Computers 2010.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
E. Wainright Martin Carol V. Brown Daniel W. DeHayes Jeffrey A. Hoffer William C. Perkins MANAGINGINFORMATIONTECHNOLOGY FIFTH EDITION CHAPTER 9 (part b)
Chapter 9 Using Data Flow Diagrams
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Chapter 7 Using Data Flow Diagrams
Systems Analysis and Design in a Changing World, 6th Edition
Chapter 9 Database Management
Input/Output Design User Interface Design
Management Information Systems
Systems Analysis and Design in a Changing World, 6th Edition
Systems Analysis and Design in a Changing World, 6th Edition
Systems Analysis and Design in a Changing World, 6th Edition
Designing Inputs, Outputs, and Controls
Objectives Discuss examples of system interfaces found in information systems Define system inputs and outputs based on the requirements models of the.
Systems Analysis and Design in a Changing World, 6th Edition
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Discovering Computers Fundamentals, 2012 Edition Your Interactive Guide to the Digital World.
2 Object-Oriented Analysis and Design with the Unified Process Overview  Many System inputs and outputs do not require much human intervention  Electronic.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Systems Analysis and Design in a Changing World, 6th Edition
Output and User Interface Design
15 Chapter 15 Design System Interfaces, Controls, and Security Systems Analysis and Design in a Changing World, 5th Edition.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
System Analysis and Design
1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]
Chapter 9 Moving to Design
10 ITK261 The traditional approach to design Reading: Chapter 10 Oct 9, 11.
1 4 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 4 Beginning the Analysis: Investigating System Requirements.
© 2001 Business & Information Systems 2/e1 Chapter 8 Personal Productivity and Problem Solving.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Professor Michael J. Losacco CIS 1110 – Using Computers Database Management Chapter 9.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe the qualities of valuable information.
Systems Analysis and Design in a Changing World, 3rd Edition
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
INFORMATION X INFO425: Systems Design Chapter 15 Designing System Interfaces, Security and Controls.
INFO 355Week #71 Systems Analysis II User and system interface design INFO 355 Glenn Booker.
1 6 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 6 The Traditional Approach to Requirements.
Systems Analysis and Design in a Changing World, 6th Edition
University of Toronto at Scarborough © Kersti Wain-Bantin CSCC40 user dialogue 1 why good interface design? reduces input and usage errors lowers the cost.
1 User Interface Design Components Chapter Key Definitions The navigation mechanism provides the way for users to tell the system what to do The.
IFS310: Module 11 Input/Output Design - Physical design of output reports and input forms.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
1 Chapter 9 Database Management. Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe.
Chapter 11 Information and Data Management Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
1 7 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 7 The Object-Oriented Approach to Requirements.
14 Systems Analysis and Design in a Changing World, Fourth Edition.
Final Review Systems Analysis and Design in a Changing World, 4th Edition 1 Final Review u Chapters 1-6, 8-10, 13, 14, 15 u Multiple choice, short answer,
Systems Analysis and Design in a Changing World, Fourth Edition
Chapter 11 Designing Inputs, Outputs, and Controls.
System Design.
Chapter Ten Managing a Database.
Processing Integrity and Availability Controls
Database Management Systems
Guidelines for designing Windows and Forms
Systems Design Chapter 6.
SDLC Phases Systems Design.
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security

2 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Objectives u Discuss examples of system interfaces found in information systems u Define system inputs and outputs based on the requirements of the application program u Design printed and on-screen reports appropriate for recipients u Explain the importance of integrity controls

3 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Objectives u Identify required integrity controls for inputs, outputs, data, and processing u Discuss issues related to security that affect the design and operation of information systems

4 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Full Range of Inputs and Outputs Figure 12-1

5 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Design of System Inputs u Identify devices and mechanisms used to enter input u Identify all system inputs and develop list of data content with each u Determine controls necessary for each system input

6 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Input Devices and Mechanisms u Capture data as close to origination as possible u Use electronic device and automatic entry whenever possible u Avoid human involvement as much as possible u Avoid data reentry and seek information in electronic form u Validate and correct at entry point

7 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Prevalent Input Devices to Avoid Keystroking u Magnetic card strip readers u Bar-code readers u Optical character recognition readers and scanners u Touch screens and devices u Electronic pens and writing surfaces u Digitizers, such as digital cameras and digital audio devices

8 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Defining Details of System Inputs u Ensure all data inputs are identified and specified correctly u Can use traditional structured models l Identify automation boundary u Use DFD fragments u Segment by program boundaries l Examine Structure Charts u Analyze each module and data couple u List individual data fields

9 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Automation Boundary on System-Level DFD Figure 12-3

10 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Structure Chart for Create New Order Figure 12-6

11 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Elements Making Up an Input Figure 12-7

12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Using OO Models u May identify inputs using OO diagrams u Sequence diagrams identify each incoming message u Design class diagram contain pseudocode to verify the characteristics of inputs

13 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Sequence Diagram for Create New Order Figure 12-9

14 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Input Messages and Data Parameters from RMO Sequence Diagram Figure 12-10

15 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Customer Class with Interfaces for Input Forms Figure 12-11a

16 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Order Class with Interfaces for Input Forms Figure 12-11b

17 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Designing System Outputs 1.Determine each type of output 2.Make a list of specific outputs required based on application design 3.Specify any necessary controls to protect the information provided in the output 4.Design and prototype the output layout

18 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Defining the Details of System Outputs u Type of reports l Printed l Electronic l Turnaround documents u May use traditional structured models to identify outputs l Data flows crossing automation boundary l Data couples and report data requirements on structure chart

19 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Table of System Outputs Based on Traditional Structured Approach Figure 12-12

20 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Using OO Models u Outputs indicated by messages in sequence diagrams l Originate from internal system objects l Sent to external actors u Output messages based on an individual object are usually part of the methods of that class object

21 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd System Outputs Based on OO Messages Figure 12-13

22 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Designing Reports, Statements, and Turnaround Documents u Printed versus electronic u Type of output l Detailed l Summary l Exception l Executive u Internal versus external u Drill down and linking u Graphical and multimedia presentation

23 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Summary Report with Drill Down to Details Figure 12-16

24 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Formatting Reports u What is report objective u Who is the intended audience u Avoid information overload u Format considerations

25 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Designing Integrity Controls u Mechanisms and procedures built into a system to safeguard it and the information contained within u Integrity controls l Built into application system to safeguard information u Security controls l Built into operating system and network

26 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Objectives of Integrity Controls u Ensure that only appropriate and correct business transactions occur u Ensure that transactions are recorded and processed correctly u Protect and safeguard assets of the organization l Software l Hardware l Information

27 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Points of Security and Integrity Controls Figure 12-18

28 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Input Integrity Controls u Used with all input mechanisms u Additional level of verification to help reduce input errors u Common control techniques l Field combination controls l Value limit controls l Completeness controls l Data validation controls

29 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Database Integrity Controls u Access control u Data encryption u Transaction control u Update control u Backup and recovery protection

30 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Output Integrity Controls u Ensures output arrives at proper destination and is correct, accurate, complete, and current l Destination controls - output is channeled to correct people l Completeness, accuracy, and corrrectness controls u Appropriate information present on output

31 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Designing Security Controls u Security Controls used to protect assets of organization from all threats l Primary focus is on external threats u Security control objectives l Maintain stable, functioning operating environment for users and application systems l Protect information and transactions during transmission outside the organization

32 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Security for Access to Systems u Used to control access to any resource managed by network or operating system u User categories l Unauthorized user l Registered user l Privileged user u Organized to so all resources can be accessed with same unique ID/password combination

33 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Users and Access Roles to Computer Systems Figure 12-19

34 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Data Security u Encryption is primary security method l Symmetric key l Asymmetric key l Public key u Digital signatures and certificates u Secure transactions l SSL / TLS l IPSec l HTTPS / HTTP-S

35 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Symmetric Key Encryption Figure 12-20

36 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Asymmetric Key Encryption Figure 12-21

37 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Using a Digital Certificate Figure 12-22