14 Systems Analysis and Design in a Changing World, Fourth Edition.

Slides:



Advertisements
Similar presentations
Systems Analysis and Design in a Changing World, Fourth Edition
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Chapter 12 Designing System Interfaces, Controls, and Security
Chapter 10 The Traditional Approach to Design
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Systems Analysis and Design in a Changing World, 6th Edition
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 10 Managing a Database.
Risks, Controls and Security Measures
Database Management: Getting Data Together Chapter 14.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
14 Systems Analysis and Design in a Changing World, Fourth Edition.
Living in a Digital World Discovering Computers 2010.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System interfaces Updated: November 2014.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Systems Analysis and Design in a Changing World, 6th Edition
Systems Analysis and Design in a Changing World, 6th Edition
Systems Analysis and Design in a Changing World, 6th Edition
Designing Inputs, Outputs, and Controls
Chapter 11 Databases. 11 Chapter 11: Databases2 Chapter Contents  Section A: File and Database Concepts  Section B: Data Management Tools  Section.
Objectives Discuss examples of system interfaces found in information systems Define system inputs and outputs based on the requirements models of the.
Systems Analysis and Design in a Changing World, 6th Edition
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Discovering Computers Fundamentals, 2012 Edition Your Interactive Guide to the Digital World.
2 Object-Oriented Analysis and Design with the Unified Process Overview  Many System inputs and outputs do not require much human intervention  Electronic.
BUSINESS B1 Information Security.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
15 Chapter 15 Design System Interfaces, Controls, and Security Systems Analysis and Design in a Changing World, 5th Edition.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
System Analysis and Design
1 LECTURE 11: User Interface and System Security and Controls ITEC 3010 “Systems Analysis and Design, I” [Prof. Peter Khaiter]
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Types of Electronic Infection
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe the qualities of valuable information.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Systems Analysis and Design in a Changing World, 3rd Edition
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
INFORMATION X INFO425: Systems Design Chapter 15 Designing System Interfaces, Security and Controls.
INFO 355Week #71 Systems Analysis II User and system interface design INFO 355 Glenn Booker.
DIGITAL SIGNATURE.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
1 Chapter 9 Database Management. Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe.
Chapter 11 Information and Data Management Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Information Systems Design and Development Security Precautions Computing Science.
Systems Analysis and Design in a Changing World, Fourth Edition
Securing Information Systems
INFORMATION SYSTEMS SECURITY AND CONTROL.
Chapter 11 Designing Inputs, Outputs, and Controls.
Controlling Computer-Based Information Systems, Part II
Chapter Ten Managing a Database.
Guidelines for designing Windows and Forms
Systems Design Chapter 6.
ONLINE SECURE DATA SERVICE
SDLC Phases Systems Design.
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

14 Systems Analysis and Design in a Changing World, Fourth Edition

14 Systems Analysis and Design in a Changing World, 4th Edition 2 Learning Objectives u Discuss examples of system interfaces found in information systems u Define system inputs and outputs based on the requirements of the application program u Design printed and on-screen reports appropriate for recipients u Explain the importance of integrity controls u Identify required integrity controls for inputs, outputs, data, and processing u Discuss issues related to security that affect the design and operation of information systems

14 Systems Analysis and Design in a Changing World, 4th Edition 3 Overview u This chapter focuses on system interfaces, system outputs, and system controls that do not require much human interaction u Many system interfaces are electronic transmissions or paper outputs to external agents u System developers need to design and implement integrity and security controls to protect system and its data u Outside threats from Internet and e-commerce are growing concern

14 Systems Analysis and Design in a Changing World, 4th Edition 4 Identifying System Interfaces u System interfaces are broadly defined as inputs or outputs with minimal or no human intervention l Inputs from other systems (messages, EDI) l Highly automated input devices such as scanners, bar- code reader. l Inputs that are from data in external databases l Outputs to external databases l Outputs with minimal HCI l Outputs to other systems l Process inputs, interact with other systems in real-time and distribute outputs with minimal human interaction

14 Systems Analysis and Design in a Changing World, 4th Edition 5 Full Range of Inputs and Outputs

14 Systems Analysis and Design in a Changing World, 4th Edition 6 eXtensible Markup Language (XML) u Extension of HTML that embeds self-defined data structures in textual messages u Transaction that contains data fields can be sent with XML codes to define meaning of data fields u XML provides common system-to-system interface u XML is simple and readable by people u Web services is based on XML to send business transactions over Internet

14 Systems Analysis and Design in a Changing World, 4th Edition 7 System-to-System Interface Based on XML

14 Systems Analysis and Design in a Changing World, 4th Edition 8 Design of System Inputs  When designing inputs for a system, the system developer must focus on three areas: u Identify devices and mechanisms used to enter input l High-level review of up-to-date methods to enter data u Identify all system inputs and develop list of data content for each l Provide link between design of application software and design of user and system interfaces u Determine controls and security necessary for each system input l Statement of policy and control requirements

14 Systems Analysis and Design in a Changing World, 4th Edition 9 Input Devices and Mechanisms  Several good practices can help to reduce input errors( error-free): u Capture data as close to original source as possible u Use electronic devices and automatic entry whenever possible to avoid human involvement as much as possible o Bar-code reader, touch screen and devices, electronics pen and writing interface, magnetic card strip reader, digitizers, such as digital cameras and digital audio devices u Seek information in electronic form to avoid data re-entry u Validate and correct information at entry point

14 Systems Analysis and Design in a Changing World, 4th Edition 10 Defining the Details of System Inputs u Ensure all data inputs are identified and specified correctly u The idea is same for both structured and OO models. u Traditional structured approach: l Identify automation boundary u Use DFD fragments u Segment by program boundaries l Examine structure charts u Analyze each module and data couple u List individual data fields

14 DFD with Automation System Boundary (Figure 14-3) Systems Analysis and Design in a Changing World, 4th Edition 11

14 The Create New Order DFD with an Automation Boundary ( Figure 14-4) Systems Analysis and Design in a Changing World, 4th Edition 12

14 The Structure Chart for the Create New Order Program (Figure 14-6) Systems Analysis and Design in a Changing World, 4th Edition 13

14 Systems Analysis and Design in a Changing World, 4th Edition 14 Using Object-Oriented Models u Identifying user and system inputs with OO approach has same tasks as traditional approach u OO diagrams are used instead of DFDs and structure charts u System sequence diagrams identify each incoming message u Design class diagrams identify and describe input parameters and verify characteristics of inputs

14 Systems Analysis and Design in a Changing World, 4th Edition 15 System Sequence Diagram for Create New Order

14 Systems Analysis and Design in a Changing World, 4th Edition 16 Input Messages and Data Parameters from RMO System Sequence Diagram (Figure 14-10)

14 Systems Analysis and Design in a Changing World, 4th Edition 17 Designing System Outputs  As with input design, the tasks in this activities accomplish four objectives: u Determine each type of the system output. u Make list of specific system outputs required based on application design u Specify any necessary controls to protect information provided in output u Design and prototype output layout u Ad hoc reports – designed as needed by user (tools and preformatted tools)

14 Systems Analysis and Design in a Changing World, 4th Edition 18 Defining the Details of System Outputs u Type of reports l Printed reports l Electronic displays l Turnaround documents u Can use traditional structured models to identify outputs l Data flows crossing automation boundary l Data couples and report data requirements on structure chart

14 Systems Analysis and Design in a Changing World, 4th Edition 19 Table of System Outputs Based on Traditional Structured Approach (Figure 14-11)

14 Systems Analysis and Design in a Changing World, 4th Edition 20 Using Object-Oriented Models u Outputs indicated by messages in sequence diagrams l Originate from internal system objects l Sent to external actors or another external system u Output messages based on an individual object are usually part of methods of that class object u To report on all objects within a class, class-level method is used that works on entire class

14 Systems Analysis and Design in a Changing World, 4th Edition 21 Table of System Outputs Based on OO Messages (Figure 14-12)

14 Systems Analysis and Design in a Changing World, 4th Edition 22 Designing Reports, Statements, and Turnaround Documents u Printed versus electronic u Types of output reports l Detailed: Report containing detailed transactions or records l Summary: Report that recaps or summarizes detailed information over a period of time or some category l Exception: Report that contains only information about nonstandard, or exception, conditions l Executive: A summary report from various information sources that is normally used for strategic decision.

14 Designing Reports, Statements, and Turnaround Documents (Cont.) u Internal versus external output o Internal output: printed report or document produced for use inside an organization. o External output: printed documents such as statements, notices, form letters and legal documents produced for use outside an organization  Turnaround document: an external output that includes a portion that is returned to the system as an input. u Graphical and multimedia presentation Systems Analysis and Design in a Changing World, 4th Edition 23

14 Systems Analysis and Design in a Changing World, 4th Edition 24 RMO Summary Report with Drill Down to the Detailed Report

14 Systems Analysis and Design in a Changing World, 4th Edition 25 Formatting Reports u What is objective of report? u Who is the intended audience? u What is media for presentation? u Avoid information overload u Format considerations include meaningful headings, date of information, date report produced, page numbers

14 Systems Analysis and Design in a Changing World, 4th Edition 26 Designing Integrity Controls u Mechanisms and procedures built into an application system to safeguard the information contained within u Integrity controls l Built into application and database system to safeguard information. u Security controls l Built into operating system and network

14 Systems Analysis and Design in a Changing World, 4th Edition 27 Objectives of Integrity Controls u Ensure that only appropriate and correct business transactions occur u Ensure that transactions are recorded and processed correctly u Protect and safeguard assets of the organization l Software l Hardware l Information

14 Systems Analysis and Design in a Changing World, 4th Edition 28 Points of Security and Integrity Controls

14 Systems Analysis and Design in a Changing World, 4th Edition 29 Input Integrity Controls u Used with all input mechanisms u Additional level of verification to help reduce input errors u Common control techniques l Field combination controls: verifies the data in one field based on data in another field or fields ( on an insurance policy, the application date must be prior to the date the policy is place in force. l Value limit controls: identifies when a value in a field is too large or small.

14 Input Integrity Controls (Cont.) l Completeness controls: ensure that all necessary field on an input form have been entered ( If a dependent is entered on an insurance form, that person`s birthdays must be entered). l Data validation controls: ensure that the numeric fields that contain code are correct ( national ID numbers might be created with ten-digit) Systems Analysis and Design in a Changing World, 4th Edition 30

14 Systems Analysis and Design in a Changing World, 4th Edition 31 Database Integrity Controls  Most DBMS include integrity control and security features. u Access controls u Data encryption u Transaction controls u Update controls u Backup and recovery protection

14 Systems Analysis and Design in a Changing World, 4th Edition 32 Output Integrity Controls u Ensure output arrives at proper destination and is correct, accurate, complete, and current u Destination controls - output is channeled to correct people u Completeness, accuracy, and correctness controls u Appropriate information present in output

14 Systems Analysis and Design in a Changing World, 4th Edition 33 Integrity Controls to Prevent Fraud u Three conditions are present in fraud cases l Personal pressure, such as desire to maintain extravagant lifestyle l Rationalizations, including “I will repay this money” or “I have this coming” l Opportunity, such as unverified cash receipts u Control of fraud requires both manual procedures and computer integrity controls

14 Systems Analysis and Design in a Changing World, 4th Edition 34 Fraud Risks and Prevention Techniques

14 Systems Analysis and Design in a Changing World, 4th Edition 35 Designing Security Controls u Security controls protect assets of organization from all threats. The primary focus is generally on external threats. l External threats such as hackers, viruses, worms, and message overload attacks u Security control objectives l Maintain stable, functioning operating environment for users and application systems (24 x 7) ( Gateways between internal systems and the internet) l Protect information and transactions during transmission outside organization (public carriers).

14 Systems Analysis and Design in a Changing World, 4th Edition 36 Security for Access to Systems u Used to control access to any resource managed by operating system or network including hardware, application program and data files. u Authorization: the process of determining whether a user is permitted to have access to the system and data. u Access control list: the list of users who have rights to access the system and data. u Types of users: l Unauthorized user – a person who does not have authorized access to any part of a system ( hacker and former employees)

14 Security for Access to Systems (Cont.) l Registered user – a user who is registered or known to the system and authorized to access some part of it (system programmer, supplier) l Privileged user – a user who have a special security access to a system. (system administrator and manager) u Organized so that all resources can be accessed with same unique ID/password combination Systems Analysis and Design in a Changing World, 4th Edition 37

14 Systems Analysis and Design in a Changing World, 4th Edition 38 Users and Access Roles to Computer Systems

14 Systems Analysis and Design in a Changing World, 4th Edition 39 Managing User Access u Most common technique is user ID / password u Authentication – the process of identifying a user to verify that he can access to the system u Smart card – computer-readable plastic card with embedded security information u Biometric devices – keystroke patterns, fingerprinting, retinal scans, voice characteristics

14 Systems Analysis and Design in a Changing World, 4th Edition 40 Data Security u Data and files themselves must be secure u Encryption – primary security method l Altering data so unauthorized users cannot view. u Decryption l Altering encrypted data back to its original state u Symmetric key – same key encrypts and decrypts u Asymmetric key – different key decrypts u Public key – public encrypts; private decrypts

14 Systems Analysis and Design in a Changing World, 4th Edition 41 Symmetric Key Encryption

14 Systems Analysis and Design in a Changing World, 4th Edition 42 Asymmetric Key Encryption

14 Systems Analysis and Design in a Changing World, 4th Edition 43 Digital Signatures and Certificates u Encryption of messages enables secure exchange of information between two entities with appropriate keys u Digital signature encrypts document with private key to verify document author u Digital certificate is institution’s name and public key that is encrypted and certified by third party u Certifying authority l VeriSign or Equifax

14 Systems Analysis and Design in a Changing World, 4th Edition 44 Using a Digital Certificate

14 Systems Analysis and Design in a Changing World, 4th Edition 45 Secure Transactions u Standard set of methods and protocols for authentication, authorization, privacy, integrity u Secure Sockets Layer (SSL) renamed as Transport Layer Security (TLS) – protocol for secure channel to send messages over Internet u IP Security (IPSec) – newer standard for transmitting Internet messages securely u Secure Hypertext Transport Protocol (HTTPS or HTTP-S) – standard for transmitting Web pages securely (encryption, digital signing, certificates)