1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and...

66
1 LECTURE 11: LECTURE 11: User Interface and System Security User Interface and System Security and Controls and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

Transcript of 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and...

Page 1: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

1

LECTURE 11:LECTURE 11:User Interface and System Security User Interface and System Security

and Controlsand Controls

ITEC 3010 “Systems Analysis and Design, I”

[Prof. Peter Khaiter]

Page 2: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

2

TopicsTopics

Inputs and OutputsInputs and Outputs User and System InterfaceUser and System Interface User-Centered DesignUser-Centered Design Metaphors for HCIMetaphors for HCI Designing System InputsDesigning System Inputs Designing System OutputsDesigning System Outputs Designing Integrity Controls Designing Integrity Controls Designing Security Controls Designing Security Controls Managing User Access Managing User Access Data Security Data Security

Page 3: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

3

Identifying and Classifying Identifying and Classifying Inputs and OutputsInputs and Outputs

Identified by analyst when defining system scope

Requirements model produced during analysis

Event table includes trigger to each external event

Triggers represent inputs

Outputs are shown as responses to events

Page 4: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

4

Traditional and OO Approaches to Traditional and OO Approaches to Inputs and OutputsInputs and Outputs

Traditional approach to inputs and outputs

Shown as data flows on context diagram, data flow diagram (DFD) fragments, and detailed DFDs

OO approach to inputs and outputsDefined by message entering or leaving systemDocumented in system sequence diagram (SSD)Actors provide inputs for many use casesUse cases provide outputs to actors

Page 5: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

5

User versus System InterfaceUser versus System Interface

System interfaces – I/O requiring minimal human interaction

User interfaces

I/O requiring human interaction

User interface is everything end user comes into contact with while using the system

To the user, the interface is the system

Analyst designs system interfaces separate from user interfaces

Requires different expertise and technology

Page 6: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

6

Understanding the User InterfaceUnderstanding the User Interface

Physical aspects of the user interfaceDevices touched by user, manuals, documentation, and forms

Perceptual aspects of the user interfaceEverything else user sees, hears, or touches such as screen objects, menus, and buttons

Conceptual aspects of the user interfaceWhat user knows about system and logical function of system

Page 7: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

7

Aspects of the User InterfaceAspects of the User Interface

Page 8: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

8

User-Centered DesignUser-Centered Design

Focus early on the users and their work by focusing on requirements

Usability - system is easy to learn and use Iterative development keeps focus on

userContinually return to user requirements and evaluate system after each iteration

Human-computer interaction (HCI) Study of end users and interaction with computers

Human factors engineering (ergonomics)

Page 9: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

9

Metaphors for Metaphors for Human-Computer InteractionHuman-Computer Interaction

Direct manipulation metaphorUser interacts with objects on display screen

Document metaphorComputer is involved with browsing and entering data in electronic documentsWWW, hypertext, and hypermedia

Dialog metaphorMuch like carrying on a conversation

Page 10: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

10

Desktop Metaphor Based on Direct Desktop Metaphor Based on Direct Manipulation Shown on Display Manipulation Shown on Display ScreenScreen

Page 11: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

11

Document Metaphor Shown as Document Metaphor Shown as Hypermedia in Web BrowsersHypermedia in Web Browsers

Page 12: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

12

Dialog Metaphor Expresses the Dialog Metaphor Expresses the Messaging ConceptMessaging Concept

Page 13: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

13

Guidelines for Designing User Guidelines for Designing User InterfacesInterfaces

VisibilityAll controls should be visibleProvide immediate feedback to indicate control is responding

AffordanceAppearance of control should suggest its functionality – purpose for which it is used

System developers should use published interface design standards and guidelines

Page 14: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

14

Eight Golden Rules for Eight Golden Rules for Interactive Interface DesignInteractive Interface Design

Page 15: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

15

Documenting Dialog DesignsDocumenting Dialog Designs

Done simultaneously with other system activities

Based on inputs and outputs requiring user interaction

Used to define menu hierarchy Allows user to navigate to each dialogProvides overall system structure

Storyboards, prototypes, and UML diagrams

Page 16: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

16

Overall Menu Hierarchy Design:

Each Use Case is Listed Under a Menu

Utilities, Preferences, and Help Are Added

Page 17: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

17

Dialogs and StoryboardsDialogs and Storyboards

Many methods exist for documenting dialogs

Written descriptions following flow of activities like in use case description

Narratives

Sketches of screens

Storyboarding – showing sequence of sketches of display screen during a dialog

Page 18: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

18

Storyboard for the Downtown Videos Rent Videos Dialog

Page 19: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

19

Guidelines for Designing Guidelines for Designing Windows and Browser FormsWindows and Browser Forms

Each dialog might require several windows forms

Standard forms are widely available

Windows: Visual Basic, C++, C#, Java

Browser: HTML, VBScript, JavaScript, ASP, Java servlets

Implementation

Identify objectives of form and associated data fields

Construct form with prototyping tools

Page 20: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

20

Form Design IssuesForm Design Issues

Form layout and formatting consistencyHeadings, labels, logosFont sizes, highlighting, colorsOrder of data-entry fields and buttons

Data keying and data entry (use standard controls)

Text boxes, list boxes, combo boxes, and so on Navigation and support controls Help support – tutorials, indexes, context-

sensitive

Page 21: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

21

Design for RMO Phone-Order Design for RMO Phone-Order DialogDialog

Steps in dialog models

1. Record customer information

2. Create new order

3. Record transaction details

4. Produce order confirmation

Traditional approach – use structure charts

OO approach – expand SSD to include forms

Page 22: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

22

Required Forms for RMORequired Forms for RMO

Main menu

Customer

Item search

Product detail

Order summary

Shipping and payment options

Order confirmation

Page 23: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

23

Design Concept for Sequential Design Concept for Sequential Approach to Approach to Create New OrderCreate New Order DialogDialog

Page 24: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

24

Design Concept for Order-Centered Design Concept for Order-Centered Approach to Approach to Create New OrderCreate New Order DialogDialog

Page 25: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

25

Prototype Main Menu Form for Prototype Main Menu Form for Order-Centered Approach to DialogOrder-Centered Approach to Dialog

Page 26: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

26

Order Summary and Product Order Summary and Product Detail FormsDetail Forms

Page 27: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

27

Completed Order Summary and Completed Order Summary and Shipping Payment FormsShipping Payment Forms

Page 28: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

28

Identifying System InterfacesIdentifying System Interfaces

System interfaces are broadly defined as inputs or outputs with minimal or no human intervention

Inputs from other systems (messages, EDI)Highly automated input devices such as scannersInputs that are from data in external databasesOutputs to external databasesOutputs with minimal HCIOutputs to other systemsReal-time connections (both input and output)

Page 29: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

29

Just for Fun!Just for Fun!

http://www.informationaddicts.com

Page 30: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

30

Full Range of Inputs and OutputsFull Range of Inputs and Outputs

Page 31: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

31

Design of System InputsDesign of System Inputs

Identify devices and mechanisms used to enter input

High-level review of most up-to-date methods to enter data

Identify all system inputs and develop list of data content for each

Provide link between design of application software and design of user and system interfaces

Determine controls and security necessary for each system input

Page 32: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

32

Input Devices and MechanismsInput Devices and Mechanisms

Capture data as close to original source as possible

Use electronic devices and automatic entry whenever possible

Avoid human involvement as much as possible

Seek information in electronic form to avoid data re-entry

Validate and correct information at entry point

Page 33: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

33

Prevalent Input Devices to Avoid Prevalent Input Devices to Avoid Human Data EntryHuman Data Entry

Magnetic card strip readers Bar code readers Optical character recognition readers

and scanners Radio-frequency identification tags Touch screens and devices Electronic pens and writing surfaces Digitizers, such as digital cameras and

digital audio devices

Page 34: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

34

Defining the Details of System Defining the Details of System InputsInputs

Ensure all data inputs are identified and specified correctly

Can use traditional structured modelsIdentify automation boundary

Use DFD fragmentsSegment by program boundaries

Examine structure chartsAnalyze each module and data coupleList individual data fields

Page 35: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

35

Automation Boundary on a Automation Boundary on a System-Level DFDSystem-Level DFD

Page 36: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

36

Create New OrderCreate New Order DFD with DFD with an Automation Boundaryan Automation Boundary

Page 37: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

37

List of Inputs for Customer List of Inputs for Customer Support SystemSupport System

Page 38: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

38

Data Flows, Data Couples, and Data Elements Making Up Inputs

Page 39: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

39

Using Object-Oriented ModelsUsing Object-Oriented Models

Identifying user and system inputs with OO approach has same tasks as traditional approach

OO diagrams are used instead of DFDs and structure charts

System sequence diagrams identify each incoming message

Design class diagrams and sequence diagrams identify and describe input parameters and verify characteristics of inputs

Page 40: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

40

Partial System Sequence Diagram Partial System Sequence Diagram for Payroll System Use Casesfor Payroll System Use Cases

Page 41: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

41

System Sequence Diagram for System Sequence Diagram for Create New OrderCreate New Order

Page 42: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

42

Input Messages and Data Input Messages and Data Parameters from RMO System Parameters from RMO System Sequence DiagramSequence Diagram

Page 43: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

43

Designing System OutputsDesigning System Outputs

Determine each type of output

Make list of specific system outputs required based on application design

Specify any necessary controls to protect information provided in output

Design and prototype output layout

Ad hoc reports – designed as needed by user

Page 44: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

44

Defining the Details of System Defining the Details of System OutputsOutputs

Types of reportsPrinted reportsElectronic displaysTurnaround documents

Can use traditional structured models to identify outputs

Data flows crossing automation boundaryData couples and report data requirements on structure chart

Page 45: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

45

Table of System Outputs Based on Table of System Outputs Based on Traditional Structured ApproachTraditional Structured Approach

Page 46: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

46

Using Object-Oriented ModelsUsing Object-Oriented Models

Outputs indicated by messages in sequence diagrams

Originate from internal system objects Sent to external actors or another external system

Output messages based on an individual object are usually part of methods of that class object

To report on all objects within a class, class-level method is used that works on entire class

Page 47: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

47

Table of System Outputs Based Table of System Outputs Based on OO Messageson OO Messages

Page 48: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

48

Designing Integrity ControlsDesigning Integrity Controls

Mechanisms and procedures built into a system to safeguard it and information contained within

Integrity controlsBuilt into application and database system to safeguard information

Security controlsBuilt into operating system and network

Page 49: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

49

Objectives of Integrity ControlsObjectives of Integrity Controls

Ensure that only appropriate and correct business transactions occur

Ensure that transactions are recorded and processed correctly

Protect and safeguard assets of the organization

Software

Hardware

Information

Page 50: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

50

Points of Security and Integrity Points of Security and Integrity ControlsControls

Page 51: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

51

Input Integrity ControlsInput Integrity Controls

Used with all input mechanisms Additional level of verification to help

reduce input errors Common control techniques

Field combination controlsValue limit controlsCompleteness controlsData validation controls

Page 52: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

52

Database Integrity ControlsDatabase Integrity Controls

Access controls

Data encryption

Transaction controls

Update controls

Backup and recovery protection

Page 53: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

53

Output Integrity ControlsOutput Integrity Controls

Ensure output arrives at proper destination and is correct, accurate, complete, and current

Destination controls - output is channeled to correct people

Completeness, accuracy, and correctness controls

Appropriate information present in output

Page 54: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

54

Integrity Controls to Prevent FraudIntegrity Controls to Prevent Fraud

Three conditions are present in fraud cases

Personal pressure, such as desire to maintain extravagant lifestyle

Rationalizations, including “I will repay this money” or “I have this coming”

Opportunity, such as unverified cash receipts

Control of fraud requires both manual procedures and computer integrity controls

Page 55: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

55

Fraud Risks and Prevention Fraud Risks and Prevention TechniquesTechniques

Page 56: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

56

Designing Security ControlsDesigning Security Controls

Security controls protect assets of organization from all threats

External threats such as hackers, viruses, worms, and message overload attacks

Security control objectives

Maintain stable, functioning operating environment for users and application systems (24 x 7)

Protect information and transactions during transmission outside organization (public carriers)

Page 57: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

57

Security for Access to SystemsSecurity for Access to Systems

Used to control access to any resource managed by operating system or network

User categoriesUnauthorized user – no authorization to accessRegistered user – authorized to access systemPrivileged user – authorized to administrate system

Organized so that all resources can be accessed with same unique ID/password combination

Page 58: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

58

Users and Access Roles to Users and Access Roles to Computer SystemsComputer Systems

Page 59: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

59

Managing User AccessManaging User Access

Most common technique is user ID / password Authorization – Is user permitted to access? Access control list – users with rights to access Authentication – Is user who they claim to be? Smart card – computer-readable plastic card with

embedded security information Biometric devices – keystroke patterns,

fingerprinting, retinal scans, voice characteristics

Page 60: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

60

Data SecurityData Security

Data and files themselves must be secure Encryption – primary security method

Altering data so unauthorized users cannot view Decryption

Altering encrypted data back to its original state Symmetric key – same key encrypts and

decrypts Asymmetric key – different key decrypts Public key – public encrypts; private

decrypts

Page 61: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

61

Symmetric Key EncryptionSymmetric Key Encryption

Page 62: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

62

Asymmetric Key EncryptionAsymmetric Key Encryption

Page 63: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

63

Digital Signatures and CertificatesDigital Signatures and Certificates

Encryption of messages enables secure exchange of information between two entities with appropriate keys

Digital signature encrypts document with private key to verify document author

Digital certificate is institution’s name and public key that is encrypted and certified by third party

Certifying authorityVeriSign or Equifax

Page 64: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

64

Using a Digital CertificateUsing a Digital Certificate

Page 65: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

65

Secure TransactionsSecure Transactions

Standard set of methods and protocols for authentication, authorization, privacy, integrity

Secure Sockets Layer (SSL) renamed as Transport Layer Security (TLS) – protocol for secure channel to send messages over Internet

IP Security (IPSec) – newer standard for transmitting Internet messages securely

Secure Hypertext Transport Protocol (HTTPS or HTTP-S) – standard for transmitting Web pages securely (encryption, digital signing, certificates)

Page 66: 1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]

66

The End!The End!

http://www.visualjokes.com