Title: Designing Systems Interfaces, Controls, and Security
1Chapter 12
- Designing Systems Interfaces, Controls, and
Security
2Objectives
- Discuss examples of system interfaces found in
information systems - Define system inputs and outputs based on the
requirements of the application program - Design printed and on-screen reports appropriate
for recipients - Explain the importance of integrity controls
3Objectives
- Identify required integrity controls for inputs,
outputs, data, and processing - Discuss issues related to security that affect
the design and operation of information systems
4Full Range of Inputs and OutputsFigure 12-1
5Design of System Inputs
- Identify devices and mechanisms used to enter
input - Identify all system inputs and develop list of
data content with each - Determine controls necessary for each system
input
6Input Devices and Mechanisms
- Capture data as close to origination as possible
- Use electronic device and automatic entry
whenever possible - Avoid human involvement as much as possible
- Avoid data reentry and seek information in
electronic form - Validate and correct at entry point
7Prevalent Input Devices to Avoid Keystroking
- Magnetic card strip readers
- Bar-code readers
- Optical character recognition readers and
scanners - Touch screens and devices
- Electronic pens and writing surfaces
- Digitizers, such as digital cameras and digital
audio devices
8Defining Details of System Inputs
- Ensure all data inputs are identified and
specified correctly - Can use traditional structured models
- Identify automation boundary
- Use DFD fragments
- Segment by program boundaries
- Examine Structure Charts
- Analyze each module and data couple
- List individual data fields
9Automation Boundary on System-Level DFD Figure
12-3
10Structure Chart for Create New Order Figure 12-6
11Elements Making Up an Input Figure 12-7
12Using OO Models
- May identify inputs using OO diagrams
- Sequence diagrams identify each incoming message
- Design class diagram contain pseudocode to verify
the characteristics of inputs
13Sequence Diagram for Create New Order Figure 12-9
14Input Messages and Data Parameters from RMO
Sequence Diagram Figure 12-10
15Customer Class with Interfaces for Input Forms
Figure 12-11a
16Order Class with Interfaces for Input Forms
Figure 12-11b
17Designing System Outputs
- Determine each type of output
- Make a list of specific outputs required based on
application design - Specify any necessary controls to protect the
information provided in the output - Design and prototype the output layout
18Defining the Details of System Outputs
- Type of reports
- Printed
- Electronic
- Turnaround documents
- May use traditional structured models to identify
outputs - Data flows crossing automation boundary
- Data couples and report data requirements on
structure chart
19Table of System Outputs Based on Traditional
Structured Approach Figure 12-12
20Using OO Models
- Outputs indicated by messages in sequence
diagrams - Originate from internal system objects
- Sent to external actors
- Output messages based on an individual object are
usually part of the methods of that class object
21System Outputs Based on OO Messages Figure 12-13
22Designing Reports, Statements, and Turnaround
Documents
- Printed versus electronic
- Type of output
- Detailed
- Summary
- Exception
- Executive
- Internal versus external
- Drill down and linking
- Graphical and multimedia presentation
23Summary Report with Drill Down to Details Figure
12-16
24Formatting Reports
- What is report objective
- Who is the intended audience
- Avoid information overload
- Format considerations
25Designing Integrity Controls
- Mechanisms and procedures built into a system to
safeguard it and the information contained within - Integrity controls
- Built into application system to safeguard
information - Security controls
- Built into operating system and network
26Objectives of Integrity Controls
- Ensure that only appropriate and correct business
transactions occur - Ensure that transactions are recorded and
processed correctly - Protect and safeguard assets of the organization
- Software
- Hardware
- Information
27Points of Security and Integrity Controls Figure
12-18
28Input Integrity Controls
- Used with all input mechanisms
- Additional level of verification to help reduce
input errors - Common control techniques
- Field combination controls
- Value limit controls
- Completeness controls
- Data validation controls
29Database Integrity Controls
- Access control
- Data encryption
- Transaction control
- Update control
- Backup and recovery protection
30Output Integrity Controls
- Ensures output arrives at proper destination and
is correct, accurate, complete, and current - Destination controls - output is channeled to
correct people - Completeness, accuracy, and corrrectness controls
- Appropriate information present on output
31Designing Security Controls
- Security Controls used to protect assets of
organization from all threats - Primary focus is on external threats
- Security control objectives
- Maintain stable, functioning operating
environment for users and application systems - Protect information and transactions during
transmission outside the organization
32Security for Access to Systems
- Used to control access to any resource managed by
network or operating system - User categories
- Unauthorized user
- Registered user
- Privileged user
- Organized so all resources can be accessed with
same unique ID/password combination
33Users and Access Roles to Computer Systems Figure
12-19
34Data Security
- Encryption is primary security method
- Symmetric key
- Asymmetric key
- Public key
- Digital signatures and certificates
- Secure transactions
- SSL / TLS
- IPSec
- HTTPS / HTTP-S
35Symmetric Key Encryption Figure 12-20
36Asymmetric Key Encryption Figure 12-21
37Using a Digital Certificate Figure 12-22