SlideShare una empresa de Scribd logo
1 de 51
Descargar para leer sin conexión
System sequence diagram
Concept of System Sequence
Diagram (SSD)
    Part of system design. Communicates to
     OO programmers.

    SSD shows interaction between actors
     and system (global SSD), and among
     objects (detailed SSD)

    SSD specifies flow of data (messages)

    Messages are actions (resemble
     commands) invoked on destination
     object
Global SSD

Figure 6-14




       SSD of a customer order system
Global SSD – loops

Figure 6-15




                                             Note: extendedPrice =
                                             price * quantity




                           Expected output
       True/False
       Condition
                    Loop       Input
Creating global SSD
1. Start with an activity diagram and/or
    use case description.
2. Identify the input messages from actor
    to system. For figuring attributes
    (input parameters), use class diagram.
3. Identify/apply special conditions
    (iteration) to input messages, if any.
4. Identify output messages.
Creating global SSD                                    (cont.)

                                                                             Account
                                                                             accountNo
                                                                             customerID       OrderDetai
                                                                                              quantity
                                                                                              extendPrice
                                                                                Order
                                                                             orderID
                                                                             TotalAmt


                                                                                         Product
                                                                                        productID
                                                                                        size
                                                                                        description

                                                                         CatalogProduct
                                                                          price



                                                                                           Catalog
                                                                                          catalogID



Figure 6-16. Activity diagram of   Figure 6-17. Global SSD of the same       Figure 5-31 (detail).
Create New Order use case,                                                   Class diagram of RMO
Telephone Scenario at RMO
Holycross of Davao College
System Analysis and Design (IT11)
By: John Ely P. Masculino
Designing System Interfaces
                 (UI Vs SI)

System Interface (SI)        User Interface (UI)
  - I/O with minimal or no     - I/O requiring human
  human intervention.          interaction.
                               - User interface is
                               everything end user comes
                               into contact with while
                               using the system
                               - To the user, the interface
                               is the system
Identifying System Interfaces

- Inputs from other System (messages, EDI).
- Highly automated inputs such as scanners.
- Inputs that are from data in external
  databases.
- Outputs to external databases.
- Outputs with minimal HCI.
- Outputs to other systems.
- Real-time connection (both input and output).
The full range of inputs and
outputs in an information system
Designing System Inputs

 - Identify devices and mechanisms
    • High-level review of most up-to-date methods
      to enter data
 - Identify all system inputs and develop list
 of data content of each
    • Provide link between design of application
      software and design of user and system
      interfaces
 - Determine controls and security
 necessary for each system input
Input Devices and Mechanism

- Capture data as close to original source as
possible
- Use electronic devices and automatic entry
whenever possible
- Avoid human involvement as much as possible
- Seek information in electronic form to avoid
data reentry
- Validate and correct information at entry point
Prevalent Input Devices to
          Avoid Human Data Entry

- Magnetic card strip readers
- Bar code readers
- Optical character recognition readers and
scanners
- Radio-frequency identification tags
- Touch screens and devices
- Electronic pens and writing surfaces
- Digitizers, such as digital cameras and digital
audio devices
Defining the Details of System Inputs

- Ensure all data inputs are identified and
specified correctly
   • Identifying user and system inputs with OO
     approach has same tasks as traditional approach
   • OO diagrams are used instead of DFDs and
     structure charts
   • System sequence diagrams identify each
     incoming message
   • Design class diagrams and sequence diagrams
     identify and describe input parameters and verify
     characteristics of inputs
Partial System Sequence Diagram for Payroll
             System Use Cases
System Sequence Diagram for Create New Order
Input Messages and Data Parameters from
     RMO System Sequence Diagram
Designing System Outputs

 - Determine each type of output
 - Make list of specific system outputs required
 based on application design
 - Specify any necessary controls to protect
 information provided in output
 - Design and prototype output layout
 - Ad hoc reports – designed as needed by
 user
Defining the Details of System Outputs


   Outputs indicated by messages in sequence
    diagrams
     – Originate from internal system objects
     – Sent to external actors or another external
       system
   Output messages based on an individual object are
    usually part of methods of that class object
   To report on all objects within a class, class-level
    method is used that works on entire class
Table of System Outputs Based on OO
              Messages
Types of reports

– Printed reports
– Electronic displays
– Turnaround documents
– Graphical and Multimedia presentation
Types of Output Reports

   Detailed
     – Contains detailed transactions or records
   Summary
     – Recaps periodic activity
   Exception
     – Only contains information about nonstandard
       conditions
   Executive
     – Summary report used for strategic decisions
Designing Integrity Controls

   Mechanisms and procedures built into a system
    to safeguard it and information contained within

   Integrity controls
     – Built into application and database system to
       safeguard information

   Security controls
Objectives of Integrity Controls

- Ensure that only appropriate and correct
business transactions occur
- Ensure that transactions are recorded and
processed correctly
- Protect and safeguard assets of the
organization
   • Software
   • Hardware
   • Information
Points of Security and Integrity Controls
Input Integrity Controls

– Used with all input mechanisms
– Additional level of verification to help
  reduce input errors
– Common control techniques
   •   Field combination controls
   •   Value limit controls
   •   Completeness controls
   •   Data validation controls
Database Integrity Controls

– Access controls
– Data encryption
– Transaction controls
– Update controls
– Backup and recovery protection
Output Integrity Controls

– Ensure output arrives at proper destination
  and is correct, accurate, complete, and
  current
– Destination controls - output is channeled
  to correct people
– Completeness, accuracy, and correctness
  controls
– Appropriate information present in output
Integrity Controls to Prevent Fraud

   Three conditions are present in fraud cases
    – Personal pressure, such as desire to maintain
      extravagant lifestyle
    – Rationalizations, including “I will repay this money”
      or “I have this coming”
    – Opportunity, such as unverified cash receipts
   Control of fraud requires both manual
    procedures and computer integrity controls
Fraud Risks and Prevention Techniques
Designing Security Controls

   Security controls protect assets of
    organization from all threats
    – External threats such as hackers, viruses, worms,
      and message overload attacks
   Security control objectives
    – Maintain stable, functioning operating environment
      for users and application systems (24 x 7)
    – Protect information and transactions during
      transmission outside organization (public carriers)
Security for Access to Systems

 Used to control access to any resource managed
  by operating system or network
 User categories
   – Unauthorized user – no authorization to
     access
   – Registered user – authorized to access
     system
   – Privileged user – authorized to administrate
     system
 Organized so that all resources can be accessed
  with same unique ID/password combination
Users and Access Roles to
   Computer Systems
Managing User Access

   Most common technique is user ID / password

   Authorization – Is user permitted to access?

   Access control list – users with rights to access

   Authentication – Is user who they claim to be?

   Smart card – computer-readable plastic card with
    embedded security information

   Biometric devices – keystroke patterns, fingerprinting,
    retinal scans, voice characteristics
Data Security

   Data and files themselves must be secure
   Encryption – primary security method
    – Altering data so unauthorized users cannot view
   Decryption
    – Altering encrypted data back to its original state
   Symmetric key – same key encrypts and
    decrypts
   Asymmetric key – different key decrypts
   Public key – public encrypts; private decrypts
Symmetric Key Encryption
Asymmetric Key Encryption
Digital Signatures and Certificates

   Encryption of messages enables secure exchange
    of information between two entities with appropriate
    keys

   Digital signature encrypts document with private
    key to verify document author

   Digital certificate is institution’s name and public
    key that is encrypted and certified by third party

   Certifying authority
    – VeriSign or Equifax
Using a Digital Certificate
Secure Transactions

   Standard set of methods and protocols for authentication,
    authorization, privacy, integrity

   Secure Sockets Layer (SSL) renamed as Transport Layer

 Security (TLS) – protocol for secure channel to send
  messages over Internet
 IP Security (IPSec) – newer standard for transmitting
  Internet messages securely

   Secure Hypertext Transport Protocol (HTTPS or HTTP-S)
    – standard for transmitting Web pages securely (encryption,
    digital signing, certificates)

Más contenido relacionado

La actualidad más candente

Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systemsvampugani
 
OS Database Security Chapter 6
OS Database Security Chapter 6OS Database Security Chapter 6
OS Database Security Chapter 6AfiqEfendy Zaen
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigationedwardbel
 
Major issues in data mining
Major issues in data miningMajor issues in data mining
Major issues in data miningSlideshare
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMSkoolkampus
 
Flow chart vs dfd
Flow chart vs dfdFlow chart vs dfd
Flow chart vs dfdWardah AK
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layerHasam Panezai
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsMayank Chaudhari
 
DFD, Decision Table, Decision Chart, Structure Charts
DFD, Decision Table, Decision Chart, Structure ChartsDFD, Decision Table, Decision Chart, Structure Charts
DFD, Decision Table, Decision Chart, Structure ChartsSOuvagya Kumar Jena
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 

La actualidad más candente (20)

Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 
OS Database Security Chapter 6
OS Database Security Chapter 6OS Database Security Chapter 6
OS Database Security Chapter 6
 
HTTP & WWW
HTTP & WWWHTTP & WWW
HTTP & WWW
 
Data encryption
Data encryptionData encryption
Data encryption
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
Major issues in data mining
Major issues in data miningMajor issues in data mining
Major issues in data mining
 
Data mining
Data mining Data mining
Data mining
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Data dictionary
Data dictionaryData dictionary
Data dictionary
 
12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS12. Indexing and Hashing in DBMS
12. Indexing and Hashing in DBMS
 
Flow chart vs dfd
Flow chart vs dfdFlow chart vs dfd
Flow chart vs dfd
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 
DFD, Decision Table, Decision Chart, Structure Charts
DFD, Decision Table, Decision Chart, Structure ChartsDFD, Decision Table, Decision Chart, Structure Charts
DFD, Decision Table, Decision Chart, Structure Charts
 
Deductive databases
Deductive databasesDeductive databases
Deductive databases
 
Data recovery
Data recoveryData recovery
Data recovery
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 

Similar a Chapter12 - Designing System Interfaces, Controls and Security(Demo Presentation)

20.project inventry management system
20.project inventry management system20.project inventry management system
20.project inventry management systemLapi Mics
 
Barcodegenrationsystem
BarcodegenrationsystemBarcodegenrationsystem
Barcodegenrationsystemshubham shukla
 
[WSO2Con USA 2018] Patterns for Building Streaming Apps
[WSO2Con USA 2018] Patterns for Building Streaming Apps[WSO2Con USA 2018] Patterns for Building Streaming Apps
[WSO2Con USA 2018] Patterns for Building Streaming AppsWSO2
 
essentialofdatabasedesign-141203001046-conversion-gate01.pdf
essentialofdatabasedesign-141203001046-conversion-gate01.pdfessentialofdatabasedesign-141203001046-conversion-gate01.pdf
essentialofdatabasedesign-141203001046-conversion-gate01.pdfAlfiaAnsari2
 
2 1ictsystemsandcomponents-110314111029-phpapp02
2 1ictsystemsandcomponents-110314111029-phpapp022 1ictsystemsandcomponents-110314111029-phpapp02
2 1ictsystemsandcomponents-110314111029-phpapp02thando Shange
 
Implementing and auditing security controls part 2
Implementing and auditing security controls   part 2Implementing and auditing security controls   part 2
Implementing and auditing security controls part 2Rafel Ivgi
 
Database Design
Database DesignDatabase Design
Database Designlearnt
 
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backendAPIsecure_ Official
 
nTireCAMS – Computerized Asset Management
nTireCAMS – Computerized Asset Management nTireCAMS – Computerized Asset Management
nTireCAMS – Computerized Asset Management sunsmart-chennai
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2
 
1Low Cost automated inventory system.docx
1Low Cost automated inventory system.docx1Low Cost automated inventory system.docx
1Low Cost automated inventory system.docxfelicidaddinwoodie
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET Journal
 
All about idoc definition architecture, implementation
All about idoc definition architecture, implementationAll about idoc definition architecture, implementation
All about idoc definition architecture, implementationmadaxx
 
All about idoc definition architecture, implementation
All about idoc definition architecture, implementationAll about idoc definition architecture, implementation
All about idoc definition architecture, implementationmadaxx
 
Access policy consolidation for event processing systems
Access policy consolidation for event processing systemsAccess policy consolidation for event processing systems
Access policy consolidation for event processing systemssumit kumar
 

Similar a Chapter12 - Designing System Interfaces, Controls and Security(Demo Presentation) (20)

20.project inventry management system
20.project inventry management system20.project inventry management system
20.project inventry management system
 
Barcodegenrationsystem
BarcodegenrationsystemBarcodegenrationsystem
Barcodegenrationsystem
 
Data and process modeling
Data and process modelingData and process modeling
Data and process modeling
 
[WSO2Con USA 2018] Patterns for Building Streaming Apps
[WSO2Con USA 2018] Patterns for Building Streaming Apps[WSO2Con USA 2018] Patterns for Building Streaming Apps
[WSO2Con USA 2018] Patterns for Building Streaming Apps
 
essentialofdatabasedesign-141203001046-conversion-gate01.pdf
essentialofdatabasedesign-141203001046-conversion-gate01.pdfessentialofdatabasedesign-141203001046-conversion-gate01.pdf
essentialofdatabasedesign-141203001046-conversion-gate01.pdf
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
 
2 1ictsystemsandcomponents-110314111029-phpapp02
2 1ictsystemsandcomponents-110314111029-phpapp022 1ictsystemsandcomponents-110314111029-phpapp02
2 1ictsystemsandcomponents-110314111029-phpapp02
 
Implementing and auditing security controls part 2
Implementing and auditing security controls   part 2Implementing and auditing security controls   part 2
Implementing and auditing security controls part 2
 
Patterns for Building Streaming Apps
Patterns for Building Streaming AppsPatterns for Building Streaming Apps
Patterns for Building Streaming Apps
 
Database Design
Database DesignDatabase Design
Database Design
 
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
 
nTireCAMS – Computerized Asset Management
nTireCAMS – Computerized Asset Management nTireCAMS – Computerized Asset Management
nTireCAMS – Computerized Asset Management
 
Validation
ValidationValidation
Validation
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
 
1Low Cost automated inventory system.docx
1Low Cost automated inventory system.docx1Low Cost automated inventory system.docx
1Low Cost automated inventory system.docx
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
 
All about idoc definition architecture, implementation
All about idoc definition architecture, implementationAll about idoc definition architecture, implementation
All about idoc definition architecture, implementation
 
All about idoc definition architecture, implementation
All about idoc definition architecture, implementationAll about idoc definition architecture, implementation
All about idoc definition architecture, implementation
 
ATS SmartHIS
ATS SmartHISATS SmartHIS
ATS SmartHIS
 
Access policy consolidation for event processing systems
Access policy consolidation for event processing systemsAccess policy consolidation for event processing systems
Access policy consolidation for event processing systems
 

Último

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Último (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

Chapter12 - Designing System Interfaces, Controls and Security(Demo Presentation)

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13. Concept of System Sequence Diagram (SSD)  Part of system design. Communicates to OO programmers.  SSD shows interaction between actors and system (global SSD), and among objects (detailed SSD)  SSD specifies flow of data (messages)  Messages are actions (resemble commands) invoked on destination object
  • 14. Global SSD Figure 6-14 SSD of a customer order system
  • 15. Global SSD – loops Figure 6-15 Note: extendedPrice = price * quantity Expected output True/False Condition Loop Input
  • 16. Creating global SSD 1. Start with an activity diagram and/or use case description. 2. Identify the input messages from actor to system. For figuring attributes (input parameters), use class diagram. 3. Identify/apply special conditions (iteration) to input messages, if any. 4. Identify output messages.
  • 17. Creating global SSD (cont.) Account accountNo customerID OrderDetai quantity extendPrice Order orderID TotalAmt Product productID size description CatalogProduct price Catalog catalogID Figure 6-16. Activity diagram of Figure 6-17. Global SSD of the same Figure 5-31 (detail). Create New Order use case, Class diagram of RMO Telephone Scenario at RMO
  • 18. Holycross of Davao College System Analysis and Design (IT11) By: John Ely P. Masculino
  • 19. Designing System Interfaces (UI Vs SI) System Interface (SI) User Interface (UI) - I/O with minimal or no - I/O requiring human human intervention. interaction. - User interface is everything end user comes into contact with while using the system - To the user, the interface is the system
  • 20. Identifying System Interfaces - Inputs from other System (messages, EDI). - Highly automated inputs such as scanners. - Inputs that are from data in external databases. - Outputs to external databases. - Outputs with minimal HCI. - Outputs to other systems. - Real-time connection (both input and output).
  • 21. The full range of inputs and outputs in an information system
  • 22. Designing System Inputs - Identify devices and mechanisms • High-level review of most up-to-date methods to enter data - Identify all system inputs and develop list of data content of each • Provide link between design of application software and design of user and system interfaces - Determine controls and security necessary for each system input
  • 23. Input Devices and Mechanism - Capture data as close to original source as possible - Use electronic devices and automatic entry whenever possible - Avoid human involvement as much as possible - Seek information in electronic form to avoid data reentry - Validate and correct information at entry point
  • 24. Prevalent Input Devices to Avoid Human Data Entry - Magnetic card strip readers - Bar code readers - Optical character recognition readers and scanners - Radio-frequency identification tags - Touch screens and devices - Electronic pens and writing surfaces - Digitizers, such as digital cameras and digital audio devices
  • 25. Defining the Details of System Inputs - Ensure all data inputs are identified and specified correctly • Identifying user and system inputs with OO approach has same tasks as traditional approach • OO diagrams are used instead of DFDs and structure charts • System sequence diagrams identify each incoming message • Design class diagrams and sequence diagrams identify and describe input parameters and verify characteristics of inputs
  • 26. Partial System Sequence Diagram for Payroll System Use Cases
  • 27. System Sequence Diagram for Create New Order
  • 28. Input Messages and Data Parameters from RMO System Sequence Diagram
  • 29. Designing System Outputs - Determine each type of output - Make list of specific system outputs required based on application design - Specify any necessary controls to protect information provided in output - Design and prototype output layout - Ad hoc reports – designed as needed by user
  • 30. Defining the Details of System Outputs  Outputs indicated by messages in sequence diagrams – Originate from internal system objects – Sent to external actors or another external system  Output messages based on an individual object are usually part of methods of that class object  To report on all objects within a class, class-level method is used that works on entire class
  • 31. Table of System Outputs Based on OO Messages
  • 32. Types of reports – Printed reports – Electronic displays – Turnaround documents – Graphical and Multimedia presentation
  • 33. Types of Output Reports  Detailed – Contains detailed transactions or records  Summary – Recaps periodic activity  Exception – Only contains information about nonstandard conditions  Executive – Summary report used for strategic decisions
  • 34. Designing Integrity Controls  Mechanisms and procedures built into a system to safeguard it and information contained within  Integrity controls – Built into application and database system to safeguard information  Security controls
  • 35. Objectives of Integrity Controls - Ensure that only appropriate and correct business transactions occur - Ensure that transactions are recorded and processed correctly - Protect and safeguard assets of the organization • Software • Hardware • Information
  • 36. Points of Security and Integrity Controls
  • 37. Input Integrity Controls – Used with all input mechanisms – Additional level of verification to help reduce input errors – Common control techniques • Field combination controls • Value limit controls • Completeness controls • Data validation controls
  • 38. Database Integrity Controls – Access controls – Data encryption – Transaction controls – Update controls – Backup and recovery protection
  • 39. Output Integrity Controls – Ensure output arrives at proper destination and is correct, accurate, complete, and current – Destination controls - output is channeled to correct people – Completeness, accuracy, and correctness controls – Appropriate information present in output
  • 40. Integrity Controls to Prevent Fraud  Three conditions are present in fraud cases – Personal pressure, such as desire to maintain extravagant lifestyle – Rationalizations, including “I will repay this money” or “I have this coming” – Opportunity, such as unverified cash receipts  Control of fraud requires both manual procedures and computer integrity controls
  • 41. Fraud Risks and Prevention Techniques
  • 42. Designing Security Controls  Security controls protect assets of organization from all threats – External threats such as hackers, viruses, worms, and message overload attacks  Security control objectives – Maintain stable, functioning operating environment for users and application systems (24 x 7) – Protect information and transactions during transmission outside organization (public carriers)
  • 43. Security for Access to Systems  Used to control access to any resource managed by operating system or network  User categories – Unauthorized user – no authorization to access – Registered user – authorized to access system – Privileged user – authorized to administrate system  Organized so that all resources can be accessed with same unique ID/password combination
  • 44. Users and Access Roles to Computer Systems
  • 45. Managing User Access  Most common technique is user ID / password  Authorization – Is user permitted to access?  Access control list – users with rights to access  Authentication – Is user who they claim to be?  Smart card – computer-readable plastic card with embedded security information  Biometric devices – keystroke patterns, fingerprinting, retinal scans, voice characteristics
  • 46. Data Security  Data and files themselves must be secure  Encryption – primary security method – Altering data so unauthorized users cannot view  Decryption – Altering encrypted data back to its original state  Symmetric key – same key encrypts and decrypts  Asymmetric key – different key decrypts  Public key – public encrypts; private decrypts
  • 49. Digital Signatures and Certificates  Encryption of messages enables secure exchange of information between two entities with appropriate keys  Digital signature encrypts document with private key to verify document author  Digital certificate is institution’s name and public key that is encrypted and certified by third party  Certifying authority – VeriSign or Equifax
  • 50. Using a Digital Certificate
  • 51. Secure Transactions  Standard set of methods and protocols for authentication, authorization, privacy, integrity  Secure Sockets Layer (SSL) renamed as Transport Layer  Security (TLS) – protocol for secure channel to send messages over Internet  IP Security (IPSec) – newer standard for transmitting Internet messages securely  Secure Hypertext Transport Protocol (HTTPS or HTTP-S) – standard for transmitting Web pages securely (encryption, digital signing, certificates)