IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.

Slides:



Advertisements
Similar presentations
Chapter 10: Designing Databases
Advertisements

Chapter 12: Designing Databases
Systems Analysis and Design in a Changing World, Fourth Edition
C6 Databases.
Chapter 12 Designing System Interfaces, Controls, and Security
By Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson, Linda Lau, Jerri Williams Chapter 9 Fine-Tuning the Database 1 Copyright.
Principles of Information Security, 2nd edition1 Cryptography.
Systems Analysis and Design in a Changing World, 6th Edition
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 10 Managing a Database.
Database Management: Getting Data Together Chapter 14.
14 Systems Analysis and Design in a Changing World, Fourth Edition.
Living in a Digital World Discovering Computers 2010.
Introduction to Databases Transparencies
Chapter 4: Database Management. Databases Before the Use of Computers Data kept in books, ledgers, card files, folders, and file cabinets Long response.
Information Technology in Organizations
Chapter 4 Relational Databases Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 4-1.
Chapter 3: Data Modeling
Chapter 4 Relational Databases Copyright © 2012 Pearson Education 4-1.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
PHASE 3: SYSTEMS DESIGN Chapter 7 Data Design.
Designing Inputs, Outputs, and Controls
Chapter 11 Databases.
Objectives Discuss examples of system interfaces found in information systems Define system inputs and outputs based on the requirements models of the.
2Object-Oriented Analysis and Design with the Unified Process Objectives  Describe the differences and similarities between relational and object-oriented.
Discovering Computers Fundamentals, 2012 Edition Your Interactive Guide to the Digital World.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
15 Chapter 15 Design System Interfaces, Controls, and Security Systems Analysis and Design in a Changing World, 5th Edition.
Concepts and Terminology Introduction to Database.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
CHAPTER 8: MANAGING DATA RESOURCES. File Organization Terms Field: group of characters that represent something Record: group of related fields File:
Chapter 12 Information Systems. 2 Managing Information Information system Software that helps the user organize and analyze data Electronic spreadsheets.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]
Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe the qualities of valuable information.
1.file. 2.database. 3.entity. 4.record. 5.attribute. When working with a database, a group of related fields comprises a(n)…
Chapter 12: Designing Databases
2Object-Oriented Analysis and Design with the Unified Process Objectives  Describe the differences and similarities between relational and object-oriented.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
INFORMATION X INFO425: Systems Design Chapter 15 Designing System Interfaces, Security and Controls.
DataBase Management System What is DBMS Purpose of DBMS Data Abstraction Data Definition Language Data Manipulation Language Data Models Data Keys Relationships.
Databases Shortfalls of file management systems Structure of a database Database administration Database Management system Hierarchical Databases Network.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
PowerPoint Presentation for Dennis, Wixom, & Tegarden Systems Analysis and Design with UML, 3rd Edition Copyright © 2009 John Wiley & Sons, Inc. All rights.
ITGS Databases.
+ Information Systems and Databases 2.2 Organisation.
Chapter 13 Designing Databases Systems Analysis and Design Kendall & Kendall Sixth Edition.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
1 DATABASE TECHNOLOGIES (Part 2) BUS Abdou Illia, Fall 2015 (September 9, 2015)
3/6: Data Management, pt. 2 Refresh your memory Relational Data Model
1 10 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 10 Designing Databases.
14 Systems Analysis and Design in a Changing World, Fourth Edition.
Information Systems Design and Development Security Precautions Computing Science.
12. Chapter 12: Designing Databases Systems Analysis and Design in a Changing World, Fourth Edition 12.
Chapter 11 Designing Inputs, Outputs, and Controls.
Chapter 5: The Art of Ensuring Integrity
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Chapter 4 Relational Databases
Databases and Information Management
Databases and Information Management
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Chapter 17 Designing Databases
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security

Content –Designing Databases –Designing the User Interface –Designing the System Interfaces, Controls and Security

2 Databases and Database Management Systems Databases (DB) – integrated collections of stored data that are centrally managed and controlled Database management system (DBMS) – system software that manages and controls access to database Databases described by a schema – description of structure, content, and access controls

3 Database Models Impacted by technology changes since 1960s Model types –Hierarchical –Network –Relational –Object-oriented Most current systems use relational or object- oriented data models

4 Relational Databases Relational database management system (RDBMS) organizes data into tables or relations Tables are two dimensional data structures –Tuples – rows or records –Fields – columns or attributes Tables have primary key field(s) that can be used to identify unique records Keys relate tables to each other

5 Partial Display of Relational Database Table

6 Designing Relational Databases Create table for each entity type Choose or invent primary key for each table Add foreign keys to represent one-to-many relationships Create new tables to represent many-to-many relationships

7 Designing Relational Databases (continued) ‏ Define referential integrity constraints Evaluate schema quality and make necessary improvements Choose appropriate data types and value restrictions (if necessary) for each field

8 Relationship Between Data in Two Tables

9 RMO Entity-Relationship Diagram

10 Representing Relationships Relational databases use foreign keys to represent relationships One-to-many relationship –Add primary key field of “one” entity type as foreign key in table that represents “many” entity type Many-to-many relationship –Use the primary key field(s) of both entity types –Use (or create) an associative entity table to represent relationship

11 Entity Tables with Primary Keys

12 Database Normalization Normal forms minimize data redundancy –First normal form (1NF) – no repeating fields or groups of fields –Functional dependency – one-to-one relationship between the values of two fields –2NF – in 1NF and if each non-key element is functionally dependent on entire primary key –3NF – in 2NF and if no non-key element is functionally dependent on any other non-key element

13 Object-Oriented Databases Direct extension of OO design and programming paradigm ODBMS stores data as objects Direct support for method storage, inheritance, nested objects, object linking, and programmer-defined data types Object Definition Language (ODL) ‏ –Standard language for describing structure and content of an object database

14 Designing Object Databases Determine which classes require persistent storage Define persistent classes Represent relationships among persistent classes Choose appropriate data types and value restrictions (if necessary) for each field

15 RMO Domain Model Class Diagram

16 One-to-Many Relationship Between Customer and Order Classes

17 Views of Stored Data

18 Relationships Relationships are represented with foreign keys Foreign key values serve same purpose as object identifiers in ODBMS 1:M relationship – add primary key field of class on “one” side of the relationship to table representing class on “many” side M:M relationship – create new table that contains primary key fields of related class tables and attributes of the relationship itself

Systems Analysis and Design in a Changing World, 5th Edition19 Identifying System Interfaces System interfaces are broadly defined as inputs or outputs with minimal or no human intervention –Inputs from other systems (messages, EDI) ‏ –Highly automated input devices such as scanners –Inputs that are from data in external databases –Outputs to external databases –Outputs with minimal HCI –Outputs to other systems –Real-time connections (both input and output) ‏

Systems Analysis and Design in a Changing World, 5th Edition20 Full Range of Inputs and Outputs Figure 15-1

Systems Analysis and Design in a Changing World, 5th Edition21 Designing System Outputs Determine each type of output Make list of specific system outputs required based on application design Specify any necessary controls to protect information provided in output Design and prototype output layout Ad hoc reports – designed as needed by user

Systems Analysis and Design in a Changing World, 5th Edition22 Defining the Details of System Outputs Type of reports –Printed reports –Electronic displays –Turnaround documents

Systems Analysis and Design in a Changing World, 5th Edition23 Sample Bar Chart and Pie Chart Reports Figure 15-17

Systems Analysis and Design in a Changing World, 5th Edition24 Formatting Reports What is objective of report? Who is the intended audience? What is media for presentation? Avoid information overload Format considerations include meaningful headings, date of information, date report produced, page numbers

Systems Analysis and Design in a Changing World, 5th Edition25 Objectives of Integrity Controls Ensure that only appropriate and correct business transactions occur Ensure that transactions are recorded and processed correctly Protect and safeguard assets of the organization –Software –Hardware –Information

Systems Analysis and Design in a Changing World, 5th Edition26 Points of Security and Integrity Controls Figure 15-18

Systems Analysis and Design in a Changing World, 5th Edition27 Input Integrity Controls Used with all input mechanisms Additional level of verification to help reduce input errors Common control techniques –Field combination controls –Value limit controls –Completeness controls –Data validation controls

Systems Analysis and Design in a Changing World, 5th Edition28 Designing Security Controls Security controls protect assets of organization from all threats –External threats such as hackers, viruses, worms, and message overload attacks Security control objectives –Maintain stable, functioning operating environment for users and application systems (24 x 7) ‏ –Protect information and transactions during transmission outside organization (public carriers) ‏

Systems Analysis and Design in a Changing World, 5th Edition29 Security for Access to Systems Used to control access to any resource managed by operating system or network User categories –Unauthorized user – no authorization to access –Registered user – authorized to access system –Privileged user – authorized to administrate system Organized so that all resources can be accessed with same unique ID/password combination

Systems Analysis and Design in a Changing World, 5th Edition30 Users and Access Roles to Computer Systems Figure 15-20

Systems Analysis and Design in a Changing World, 5th Edition31 Managing User Access Most common technique is user ID / password Authorization – Is user permitted to access? Access control list – users with rights to access Authentication – Is user who they claim to be? Smart card – computer-readable plastic card with embedded security information Biometric devices – keystroke patterns, fingerprinting, retinal scans, voice characteristics

Systems Analysis and Design in a Changing World, 5th Edition32 Data Security Data and files themselves must be secure Encryption – primary security method –Altering data so unauthorized users cannot view Decryption –Altering encrypted data back to its original state Symmetric key – same key encrypts and decrypts Asymmetric key – different key decrypts Public key – public encrypts; private decrypts

Systems Analysis and Design in a Changing World, 5th Edition33 Symmetric Key Encryption Figure 15-22

Systems Analysis and Design in a Changing World, 5th Edition34 Asymmetric Key Encryption Figure 15-23

Systems Analysis and Design in a Changing World, 5th Edition35 Digital Signatures and Certificates Encryption of messages enables secure exchange of information between two entities with appropriate keys Digital signature encrypts document with private key to verify document author Digital certificate is institution’s name and public key that is encrypted and certified by third party Certifying authority –VeriSign or Equifax

Systems Analysis and Design in a Changing World, 5th Edition36 Secure Transactions Standard set of methods and protocols for authentication, authorization, privacy, integrity Secure Sockets Layer (SSL) renamed as Transport Layer Security (TLS) – protocol for secure channel to send messages over Internet IP Security (IPSec) – newer standard for transmitting Internet messages securely Secure Hypertext Transport Protocol (HTTPS or HTTP-S) – standard for transmitting Web pages securely (encryption, digital signing, certificates) ‏

THANKS