Title: User Interface and System Security and Controls
1ITEC 2010 Systems Analysis and Design, I
LECTURE 11
User Interface and System Security and Controls
Prof. Peter Khaiter
2Topics
- Inputs and Outputs
- User and System Interface
- User-Centered Design
- Metaphors for HCI
- Designing System Inputs
- Designing System Outputs
- Designing Integrity Controls
- Designing Security Controls
- Managing User Access
- Data Security
3Identifying and Classifying Inputs and Outputs
- Identified by analyst when defining system scope
- Requirements model produced during analysis
- Event table includes trigger to each external
event - Triggers represent inputs
- Outputs are shown as responses to events
4Traditional and OO Approaches to Inputs and
Outputs
- Traditional approach to inputs and outputs
- Shown as data flows on context diagram, data flow
diagram (DFD) fragments, and detailed DFDs - OO approach to inputs and outputs
- Defined by message entering or leaving system
- Documented in system sequence diagram (SSD)?
- Actors provide inputs for many use cases
- Use cases provide outputs to actors
5User versus System Interface
- System interfaces I/O requiring minimal human
interaction - User interfaces
- I/O requiring human interaction
- User interface is everything end user comes into
contact with while using the system - To the user, the interface is the system
- Analyst designs system interfaces separate from
user interfaces - Requires different expertise and technology
6Understanding the User Interface
- Physical aspects of the user interface
- Devices touched by user, manuals, documentation,
and forms - Perceptual aspects of the user interface
- Everything else user sees, hears, or touches such
as screen objects, menus, and buttons - Conceptual aspects of the user interface
- What user knows about system and logical function
of system
7Aspects of the User Interface
8User-Centered Design
- Focus early on the users and their work by
focusing on requirements - Usability - system is easy to learn and use
- Iterative development keeps focus on user
- Continually return to user requirements and
evaluate system after each iteration - Human-computer interaction (HCI)
- Study of end users and interaction with computers
- Human factors engineering (ergonomics)?
9Metaphors for Human-Computer Interaction
- Direct manipulation metaphor
- User interacts with objects on display screen
- Document metaphor
- Computer is involved with browsing and entering
data in electronic documents - WWW, hypertext, and hypermedia
- Dialog metaphor
- Much like carrying on a conversation
10Desktop Metaphor Based on Direct Manipulation
Shown on Display Screen
11Document Metaphor Shown as Hypermedia in Web
Browsers
12Dialog Metaphor Expresses the Messaging Concept
13Guidelines for Designing User Interfaces
- Visibility
- All controls should be visible
- Provide immediate feedback to indicate control is
responding - Affordance
- Appearance of control should suggest its
functionality purpose for which it is used - System developers should use published interface
design standards and guidelines
14Eight Golden Rules for Interactive Interface
Design
15Documenting Dialog Designs
- Done simultaneously with other system activities
- Based on inputs and outputs requiring user
interaction - Used to define menu hierarchy
- Allows user to navigate to each dialog
- Provides overall system structure
- Storyboards, prototypes, and UML diagrams
16Overall Menu Hierarchy DesignEach Use Case is
Listed Under a MenuUtilities, Preferences, and
Help Are Added
17Dialogs and Storyboards
- Many methods exist for documenting dialogs
- Written descriptions following flow of activities
like in use case description - Narratives
- Sketches of screens
- Storyboarding showing sequence of sketches of
display screen during a dialog
18Storyboard for the Downtown Videos Rent Videos
Dialog
19Guidelines for Designing Windows and Browser
Forms
- Each dialog might require several windows forms
- Standard forms are widely available
- Windows Visual Basic, C, C, Java
- Browser HTML, VBScript, JavaScript, ASP, Java
servlets - Implementation
- Identify objectives of form and associated data
fields - Construct form with prototyping tools
20Form Design Issues
- Form layout and formatting consistency
- Headings, labels, logos
- Font sizes, highlighting, colors
- Order of data-entry fields and buttons
- Data keying and data entry (use standard
controls)? - Text boxes, list boxes, combo boxes, and so on
- Navigation and support controls
- Help support tutorials, indexes,
context-sensitive
21Design for RMO Phone-Order Dialog
- Steps in dialog models
- Record customer information
- Create new order
- Record transaction details
- Produce order confirmation
- Traditional approach use structure charts
- OO approach expand SSD to include forms
22Required Forms for RMO
- Main menu
- Customer
- Item search
- Product detail
- Order summary
- Shipping and payment options
- Order confirmation
23Design Concept for Sequential Approach to Create
New Order Dialog
24Design Concept for Order-Centered Approach to
Create New Order Dialog
25Prototype Main Menu Form for Order-Centered
Approach to Dialog
26Order Summary and Product Detail Forms
27Completed Order Summary and Shipping Payment Forms
28Identifying System Interfaces
- System interfaces are broadly defined as inputs
or outputs with minimal or no human intervention - Inputs from other systems (messages, EDI)?
- Highly automated input devices such as scanners
- Inputs that are from data in external databases
- Outputs to external databases
- Outputs with minimal HCI
- Outputs to other systems
- Real-time connections (both input and output)?
29Just for Fun!
http//www.informationaddicts.com
30Full Range of Inputs and Outputs
31Design of System Inputs
- Identify devices and mechanisms used to enter
input - High-level review of most up-to-date methods to
enter data - Identify all system inputs and develop list of
data content for each - Provide link between design of application
software and design of user and system interfaces - Determine controls and security necessary for
each system input
32Input Devices and Mechanisms
- Capture data as close to original source as
possible - Use electronic devices and automatic entry
whenever possible - Avoid human involvement as much as possible
- Seek information in electronic form to avoid data
re-entry - Validate and correct information at entry point
33Prevalent Input Devices to Avoid Human Data Entry
- Magnetic card strip readers
- Bar code readers
- Optical character recognition readers and
scanners - Radio-frequency identification tags
- Touch screens and devices
- Electronic pens and writing surfaces
- Digitizers, such as digital cameras and digital
audio devices
34Defining the Details of System Inputs
- Ensure all data inputs are identified and
specified correctly - Can use traditional structured models
- Identify automation boundary
- Use DFD fragments
- Segment by program boundaries
- Examine structure charts
- Analyze each module and data couple
- List individual data fields
35Automation Boundary on a System-Level DFD
36Create New Order DFD with an Automation Boundary
37List of Inputs for Customer Support System
38Data Flows, Data Couples, and Data Elements
Making Up Inputs
39Using Object-Oriented Models
- Identifying user and system inputs with OO
approach has same tasks as traditional approach - OO diagrams are used instead of DFDs and
structure charts - System sequence diagrams identify each incoming
message - Design class diagrams and sequence diagrams
identify and describe input parameters and verify
characteristics of inputs
40Partial System Sequence Diagram for Payroll
System Use Cases
41System Sequence Diagram for Create New Order
42Input Messages and Data Parameters from RMO
System Sequence Diagram
43Designing System Outputs
- Determine each type of output
- Make list of specific system outputs required
based on application design - Specify any necessary controls to protect
information provided in output - Design and prototype output layout
- Ad hoc reports designed as needed by user
44Defining the Details of System Outputs
- Types of reports
- Printed reports
- Electronic displays
- Turnaround documents
- Can use traditional structured models to identify
outputs - Data flows crossing automation boundary
- Data couples and report data requirements on
structure chart
45Table of System Outputs Based on Traditional
Structured Approach
46Using Object-Oriented Models
- Outputs indicated by messages in sequence
diagrams - Originate from internal system objects
- Sent to external actors or another external
system - Output messages based on an individual object are
usually part of methods of that class object - To report on all objects within a class,
class-level method is used that works on entire
class
47Table of System Outputs Based on OO Messages
48Designing Integrity Controls
- Mechanisms and procedures built into a system to
safeguard it and information contained within - Integrity controls
- Built into application and database system to
safeguard information - Security controls
- Built into operating system and network
49Objectives of Integrity Controls
- Ensure that only appropriate and correct business
transactions occur - Ensure that transactions are recorded and
processed correctly - Protect and safeguard assets of the organization
- Software
- Hardware
- Information
50Points of Security and Integrity Controls
51Input Integrity Controls
- Used with all input mechanisms
- Additional level of verification to help reduce
input errors - Common control techniques
- Field combination controls
- Value limit controls
- Completeness controls
- Data validation controls
52Database Integrity Controls
- Access controls
- Data encryption
- Transaction controls
- Update controls
- Backup and recovery protection
53Output Integrity Controls
- Ensure output arrives at proper destination and
is correct, accurate, complete, and current - Destination controls - output is channeled to
correct people - Completeness, accuracy, and correctness controls
- Appropriate information present in output
54Integrity Controls to Prevent Fraud
- Three conditions are present in fraud cases
- Personal pressure, such as desire to maintain
extravagant lifestyle - Rationalizations, including I will repay this
money or I have this coming - Opportunity, such as unverified cash receipts
- Control of fraud requires both manual procedures
and computer integrity controls
55Fraud Risks and Prevention Techniques
56Designing Security Controls
- Security controls protect assets of organization
from all threats - External threats such as hackers, viruses, worms,
and message overload attacks - Security control objectives
- Maintain stable, functioning operating
environment for users and application systems (24
x 7)? - Protect information and transactions during
transmission outside organization (public
carriers)?
57Security for Access to Systems
- Used to control access to any resource managed by
operating system or network - User categories
- Unauthorized user no authorization to access
- Registered user authorized to access system
- Privileged user authorized to administrate
system - Organized so that all resources can be accessed
with same unique ID/password combination
58Users and Access Roles to Computer Systems
59Managing User Access
- Most common technique is user ID / password
- Authorization Is user permitted to access?
- Access control list users with rights to access
- Authentication Is user who they claim to be?
- Smart card computer-readable plastic card with
embedded security information - Biometric devices keystroke patterns,
fingerprinting, retinal scans, voice
characteristics
60Data Security
- Data and files themselves must be secure
- Encryption primary security method
- Altering data so unauthorized users cannot view
- Decryption
- Altering encrypted data back to its original
state - Symmetric key same key encrypts and decrypts
- Asymmetric key different key decrypts
- Public key public encrypts private decrypts
61Symmetric Key Encryption
62Asymmetric Key Encryption
63Digital Signatures and Certificates
- Encryption of messages enables secure exchange of
information between two entities with appropriate
keys - Digital signature encrypts document with private
key to verify document author - Digital certificate is institutions name and
public key that is encrypted and certified by
third party - Certifying authority
- VeriSign or Equifax
64Using a Digital Certificate
65Secure Transactions
- Standard set of methods and protocols for
authentication, authorization, privacy, integrity - Secure Sockets Layer (SSL) renamed as Transport
Layer Security (TLS) protocol for secure
channel to send messages over Internet - IP Security (IPSec) newer standard for
transmitting Internet messages securely - Secure Hypertext Transport Protocol (HTTPS or
HTTP-S) standard for transmitting Web pages
securely (encryption, digital signing,
certificates)?
66The End!
http//www.visualjokes.com