SlideShare a Scribd company logo
System sequence diagram
Concept of System Sequence
Diagram (SSD)
    Part of system design. Communicates to
     OO programmers.

    SSD shows interaction between actors
     and system (global SSD), and among
     objects (detailed SSD)

    SSD specifies flow of data (messages)

    Messages are actions (resemble
     commands) invoked on destination
     object
Global SSD

Figure 6-14




       SSD of a customer order system
Global SSD – loops

Figure 6-15




                                             Note: extendedPrice =
                                             price * quantity




                           Expected output
       True/False
       Condition
                    Loop       Input
Creating global SSD
1. Start with an activity diagram and/or
    use case description.
2. Identify the input messages from actor
    to system. For figuring attributes
    (input parameters), use class diagram.
3. Identify/apply special conditions
    (iteration) to input messages, if any.
4. Identify output messages.
Creating global SSD                                    (cont.)

                                                                             Account
                                                                             accountNo
                                                                             customerID       OrderDetai
                                                                                              quantity
                                                                                              extendPrice
                                                                                Order
                                                                             orderID
                                                                             TotalAmt


                                                                                         Product
                                                                                        productID
                                                                                        size
                                                                                        description

                                                                         CatalogProduct
                                                                          price



                                                                                           Catalog
                                                                                          catalogID



Figure 6-16. Activity diagram of   Figure 6-17. Global SSD of the same       Figure 5-31 (detail).
Create New Order use case,                                                   Class diagram of RMO
Telephone Scenario at RMO
Holycross of Davao College
System Analysis and Design (IT11)
By: John Ely P. Masculino
Designing System Interfaces
                 (UI Vs SI)

System Interface (SI)        User Interface (UI)
  - I/O with minimal or no     - I/O requiring human
  human intervention.          interaction.
                               - User interface is
                               everything end user comes
                               into contact with while
                               using the system
                               - To the user, the interface
                               is the system
Identifying System Interfaces

- Inputs from other System (messages, EDI).
- Highly automated inputs such as scanners.
- Inputs that are from data in external
  databases.
- Outputs to external databases.
- Outputs with minimal HCI.
- Outputs to other systems.
- Real-time connection (both input and output).
The full range of inputs and
outputs in an information system
Designing System Inputs

 - Identify devices and mechanisms
    • High-level review of most up-to-date methods
      to enter data
 - Identify all system inputs and develop list
 of data content of each
    • Provide link between design of application
      software and design of user and system
      interfaces
 - Determine controls and security
 necessary for each system input
Input Devices and Mechanism

- Capture data as close to original source as
possible
- Use electronic devices and automatic entry
whenever possible
- Avoid human involvement as much as possible
- Seek information in electronic form to avoid
data reentry
- Validate and correct information at entry point
Prevalent Input Devices to
          Avoid Human Data Entry

- Magnetic card strip readers
- Bar code readers
- Optical character recognition readers and
scanners
- Radio-frequency identification tags
- Touch screens and devices
- Electronic pens and writing surfaces
- Digitizers, such as digital cameras and digital
audio devices
Defining the Details of System Inputs

- Ensure all data inputs are identified and
specified correctly
   • Identifying user and system inputs with OO
     approach has same tasks as traditional approach
   • OO diagrams are used instead of DFDs and
     structure charts
   • System sequence diagrams identify each
     incoming message
   • Design class diagrams and sequence diagrams
     identify and describe input parameters and verify
     characteristics of inputs
Partial System Sequence Diagram for Payroll
             System Use Cases
System Sequence Diagram for Create New Order
Input Messages and Data Parameters from
     RMO System Sequence Diagram
Designing System Outputs

 - Determine each type of output
 - Make list of specific system outputs required
 based on application design
 - Specify any necessary controls to protect
 information provided in output
 - Design and prototype output layout
 - Ad hoc reports – designed as needed by
 user
Defining the Details of System Outputs


   Outputs indicated by messages in sequence
    diagrams
     – Originate from internal system objects
     – Sent to external actors or another external
       system
   Output messages based on an individual object are
    usually part of methods of that class object
   To report on all objects within a class, class-level
    method is used that works on entire class
Table of System Outputs Based on OO
              Messages
Types of reports

– Printed reports
– Electronic displays
– Turnaround documents
– Graphical and Multimedia presentation
Types of Output Reports

   Detailed
     – Contains detailed transactions or records
   Summary
     – Recaps periodic activity
   Exception
     – Only contains information about nonstandard
       conditions
   Executive
     – Summary report used for strategic decisions
Designing Integrity Controls

   Mechanisms and procedures built into a system
    to safeguard it and information contained within

   Integrity controls
     – Built into application and database system to
       safeguard information

   Security controls
Objectives of Integrity Controls

- Ensure that only appropriate and correct
business transactions occur
- Ensure that transactions are recorded and
processed correctly
- Protect and safeguard assets of the
organization
   • Software
   • Hardware
   • Information
Points of Security and Integrity Controls
Input Integrity Controls

– Used with all input mechanisms
– Additional level of verification to help
  reduce input errors
– Common control techniques
   •   Field combination controls
   •   Value limit controls
   •   Completeness controls
   •   Data validation controls
Database Integrity Controls

– Access controls
– Data encryption
– Transaction controls
– Update controls
– Backup and recovery protection
Output Integrity Controls

– Ensure output arrives at proper destination
  and is correct, accurate, complete, and
  current
– Destination controls - output is channeled
  to correct people
– Completeness, accuracy, and correctness
  controls
– Appropriate information present in output
Integrity Controls to Prevent Fraud

   Three conditions are present in fraud cases
    – Personal pressure, such as desire to maintain
      extravagant lifestyle
    – Rationalizations, including “I will repay this money”
      or “I have this coming”
    – Opportunity, such as unverified cash receipts
   Control of fraud requires both manual
    procedures and computer integrity controls
Fraud Risks and Prevention Techniques
Designing Security Controls

   Security controls protect assets of
    organization from all threats
    – External threats such as hackers, viruses, worms,
      and message overload attacks
   Security control objectives
    – Maintain stable, functioning operating environment
      for users and application systems (24 x 7)
    – Protect information and transactions during
      transmission outside organization (public carriers)
Security for Access to Systems

 Used to control access to any resource managed
  by operating system or network
 User categories
   – Unauthorized user – no authorization to
     access
   – Registered user – authorized to access
     system
   – Privileged user – authorized to administrate
     system
 Organized so that all resources can be accessed
  with same unique ID/password combination
Users and Access Roles to
   Computer Systems
Managing User Access

   Most common technique is user ID / password

   Authorization – Is user permitted to access?

   Access control list – users with rights to access

   Authentication – Is user who they claim to be?

   Smart card – computer-readable plastic card with
    embedded security information

   Biometric devices – keystroke patterns, fingerprinting,
    retinal scans, voice characteristics
Data Security

   Data and files themselves must be secure
   Encryption – primary security method
    – Altering data so unauthorized users cannot view
   Decryption
    – Altering encrypted data back to its original state
   Symmetric key – same key encrypts and
    decrypts
   Asymmetric key – different key decrypts
   Public key – public encrypts; private decrypts
Symmetric Key Encryption
Asymmetric Key Encryption
Digital Signatures and Certificates

   Encryption of messages enables secure exchange
    of information between two entities with appropriate
    keys

   Digital signature encrypts document with private
    key to verify document author

   Digital certificate is institution’s name and public
    key that is encrypted and certified by third party

   Certifying authority
    – VeriSign or Equifax
Using a Digital Certificate
Secure Transactions

   Standard set of methods and protocols for authentication,
    authorization, privacy, integrity

   Secure Sockets Layer (SSL) renamed as Transport Layer

 Security (TLS) – protocol for secure channel to send
  messages over Internet
 IP Security (IPSec) – newer standard for transmitting
  Internet messages securely

   Secure Hypertext Transport Protocol (HTTPS or HTTP-S)
    – standard for transmitting Web pages securely (encryption,
    digital signing, certificates)

More Related Content

What's hot

HOSPITAL MANAGEMENT SYSTEM ANDROID
HOSPITAL MANAGEMENT SYSTEM ANDROIDHOSPITAL MANAGEMENT SYSTEM ANDROID
HOSPITAL MANAGEMENT SYSTEM ANDROID
Foysal Mahamud Elias
 
Employee Management System Project Propsal
Employee Management System Project Propsal Employee Management System Project Propsal
Employee Management System Project Propsal
Syed Junaid
 
04.project billing system
04.project billing system04.project billing system
04.project billing system
girivaishali
 
Use case of hospital managment system
Use case of hospital managment systemUse case of hospital managment system
Use case of hospital managment system
Mohin Uddin Majumder (Sanofi Mohin)
 
Smart health prediction using data mining by customsoft
Smart health prediction using data mining by customsoftSmart health prediction using data mining by customsoft
Smart health prediction using data mining by customsoft
Custom Soft
 
Pharmacy management system by Asiqul Islam
Pharmacy management system by Asiqul IslamPharmacy management system by Asiqul Islam
Pharmacy management system by Asiqul Islam
AshiQulIslam34
 
Gym Management System
Gym Management SystemGym Management System
Gym Management System
ijtsrd
 
School fee-management-system
School fee-management-systemSchool fee-management-system
School fee-management-system
Jitendra Shrestha
 
School management system
School management systemSchool management system
School management system
hanshika shah
 
App based e-medicare(online Pharmacy Management system)
App based e-medicare(online Pharmacy Management system)App based e-medicare(online Pharmacy Management system)
App based e-medicare(online Pharmacy Management system)
Jahidul Islam
 
MEDICAL STORE MANAGEMENT SYSTEM
MEDICAL STORE MANAGEMENT SYSTEMMEDICAL STORE MANAGEMENT SYSTEM
MEDICAL STORE MANAGEMENT SYSTEM
अनिकेत चौधरी
 
hospital management System
hospital management Systemhospital management System
hospital management System
sabin kafle
 
School Management System ppt
School Management System pptSchool Management System ppt
School Management System ppt
Mohsin Ali
 
Student Management System
Student Management SystemStudent Management System
Student Management System
Amit Gandhi
 
Security and management
Security and managementSecurity and management
Security and management
ArtiSolanki5
 
Attendance Management System
Attendance Management SystemAttendance Management System
Attendance Management System
Flexible Applications CJSC
 
Pharmacy Management System Proposal
Pharmacy Management System ProposalPharmacy Management System Proposal
Pharmacy Management System Proposal
sudiahmad1
 
Project black book TYIT
Project black book TYITProject black book TYIT
Project black book TYIT
Lokesh Singrol
 
srs for railway reservation system
 srs for railway reservation system srs for railway reservation system
srs for railway reservation system
khushi kalaria
 
Online Medicine Store
Online Medicine StoreOnline Medicine Store
Online Medicine Store
Rohit Mondal
 

What's hot (20)

HOSPITAL MANAGEMENT SYSTEM ANDROID
HOSPITAL MANAGEMENT SYSTEM ANDROIDHOSPITAL MANAGEMENT SYSTEM ANDROID
HOSPITAL MANAGEMENT SYSTEM ANDROID
 
Employee Management System Project Propsal
Employee Management System Project Propsal Employee Management System Project Propsal
Employee Management System Project Propsal
 
04.project billing system
04.project billing system04.project billing system
04.project billing system
 
Use case of hospital managment system
Use case of hospital managment systemUse case of hospital managment system
Use case of hospital managment system
 
Smart health prediction using data mining by customsoft
Smart health prediction using data mining by customsoftSmart health prediction using data mining by customsoft
Smart health prediction using data mining by customsoft
 
Pharmacy management system by Asiqul Islam
Pharmacy management system by Asiqul IslamPharmacy management system by Asiqul Islam
Pharmacy management system by Asiqul Islam
 
Gym Management System
Gym Management SystemGym Management System
Gym Management System
 
School fee-management-system
School fee-management-systemSchool fee-management-system
School fee-management-system
 
School management system
School management systemSchool management system
School management system
 
App based e-medicare(online Pharmacy Management system)
App based e-medicare(online Pharmacy Management system)App based e-medicare(online Pharmacy Management system)
App based e-medicare(online Pharmacy Management system)
 
MEDICAL STORE MANAGEMENT SYSTEM
MEDICAL STORE MANAGEMENT SYSTEMMEDICAL STORE MANAGEMENT SYSTEM
MEDICAL STORE MANAGEMENT SYSTEM
 
hospital management System
hospital management Systemhospital management System
hospital management System
 
School Management System ppt
School Management System pptSchool Management System ppt
School Management System ppt
 
Student Management System
Student Management SystemStudent Management System
Student Management System
 
Security and management
Security and managementSecurity and management
Security and management
 
Attendance Management System
Attendance Management SystemAttendance Management System
Attendance Management System
 
Pharmacy Management System Proposal
Pharmacy Management System ProposalPharmacy Management System Proposal
Pharmacy Management System Proposal
 
Project black book TYIT
Project black book TYITProject black book TYIT
Project black book TYIT
 
srs for railway reservation system
 srs for railway reservation system srs for railway reservation system
srs for railway reservation system
 
Online Medicine Store
Online Medicine StoreOnline Medicine Store
Online Medicine Store
 

Similar to Chapter12 - Designing System Interfaces, Controls and Security(Demo Presentation)

20.project inventry management system
20.project inventry management system20.project inventry management system
20.project inventry management system
Lapi Mics
 
Barcodegenrationsystem
BarcodegenrationsystemBarcodegenrationsystem
Barcodegenrationsystem
shubham shukla
 
Data and process modeling
Data and process modelingData and process modeling
Data and process modeling
Tsegaberhan Zerihun
 
[WSO2Con USA 2018] Patterns for Building Streaming Apps
[WSO2Con USA 2018] Patterns for Building Streaming Apps[WSO2Con USA 2018] Patterns for Building Streaming Apps
[WSO2Con USA 2018] Patterns for Building Streaming Apps
WSO2
 
essentialofdatabasedesign-141203001046-conversion-gate01.pdf
essentialofdatabasedesign-141203001046-conversion-gate01.pdfessentialofdatabasedesign-141203001046-conversion-gate01.pdf
essentialofdatabasedesign-141203001046-conversion-gate01.pdf
AlfiaAnsari2
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
Embitel Technologies (I) PVT LTD
 
2 1ictsystemsandcomponents-110314111029-phpapp02
2 1ictsystemsandcomponents-110314111029-phpapp022 1ictsystemsandcomponents-110314111029-phpapp02
2 1ictsystemsandcomponents-110314111029-phpapp02
thando Shange
 
Implementing and auditing security controls part 2
Implementing and auditing security controls   part 2Implementing and auditing security controls   part 2
Implementing and auditing security controls part 2
Rafel Ivgi
 
Patterns for Building Streaming Apps
Patterns for Building Streaming AppsPatterns for Building Streaming Apps
Patterns for Building Streaming Apps
Mohanadarshan Vivekanandalingam
 
Database Design
Database DesignDatabase Design
Database Design
learnt
 
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
APIsecure_ Official
 
nTireCAMS – Computerized Asset Management
nTireCAMS – Computerized Asset Management nTireCAMS – Computerized Asset Management
nTireCAMS – Computerized Asset Management
sunsmart-chennai
 
Validation
ValidationValidation
Validation
Janet Robinson
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2
 
1Low Cost automated inventory system.docx
1Low Cost automated inventory system.docx1Low Cost automated inventory system.docx
1Low Cost automated inventory system.docx
felicidaddinwoodie
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET Journal
 
All about idoc definition architecture, implementation
All about idoc definition architecture, implementationAll about idoc definition architecture, implementation
All about idoc definition architecture, implementation
madaxx
 
All about idoc definition architecture, implementation
All about idoc definition architecture, implementationAll about idoc definition architecture, implementation
All about idoc definition architecture, implementation
madaxx
 
ATS SmartHIS
ATS SmartHISATS SmartHIS
ATS SmartHIS
Hoang Le Van
 
Access policy consolidation for event processing systems
Access policy consolidation for event processing systemsAccess policy consolidation for event processing systems
Access policy consolidation for event processing systems
sumit kumar
 

Similar to Chapter12 - Designing System Interfaces, Controls and Security(Demo Presentation) (20)

20.project inventry management system
20.project inventry management system20.project inventry management system
20.project inventry management system
 
Barcodegenrationsystem
BarcodegenrationsystemBarcodegenrationsystem
Barcodegenrationsystem
 
Data and process modeling
Data and process modelingData and process modeling
Data and process modeling
 
[WSO2Con USA 2018] Patterns for Building Streaming Apps
[WSO2Con USA 2018] Patterns for Building Streaming Apps[WSO2Con USA 2018] Patterns for Building Streaming Apps
[WSO2Con USA 2018] Patterns for Building Streaming Apps
 
essentialofdatabasedesign-141203001046-conversion-gate01.pdf
essentialofdatabasedesign-141203001046-conversion-gate01.pdfessentialofdatabasedesign-141203001046-conversion-gate01.pdf
essentialofdatabasedesign-141203001046-conversion-gate01.pdf
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
 
2 1ictsystemsandcomponents-110314111029-phpapp02
2 1ictsystemsandcomponents-110314111029-phpapp022 1ictsystemsandcomponents-110314111029-phpapp02
2 1ictsystemsandcomponents-110314111029-phpapp02
 
Implementing and auditing security controls part 2
Implementing and auditing security controls   part 2Implementing and auditing security controls   part 2
Implementing and auditing security controls part 2
 
Patterns for Building Streaming Apps
Patterns for Building Streaming AppsPatterns for Building Streaming Apps
Patterns for Building Streaming Apps
 
Database Design
Database DesignDatabase Design
Database Design
 
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
 
nTireCAMS – Computerized Asset Management
nTireCAMS – Computerized Asset Management nTireCAMS – Computerized Asset Management
nTireCAMS – Computerized Asset Management
 
Validation
ValidationValidation
Validation
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
 
1Low Cost automated inventory system.docx
1Low Cost automated inventory system.docx1Low Cost automated inventory system.docx
1Low Cost automated inventory system.docx
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
 
All about idoc definition architecture, implementation
All about idoc definition architecture, implementationAll about idoc definition architecture, implementation
All about idoc definition architecture, implementation
 
All about idoc definition architecture, implementation
All about idoc definition architecture, implementationAll about idoc definition architecture, implementation
All about idoc definition architecture, implementation
 
ATS SmartHIS
ATS SmartHISATS SmartHIS
ATS SmartHIS
 
Access policy consolidation for event processing systems
Access policy consolidation for event processing systemsAccess policy consolidation for event processing systems
Access policy consolidation for event processing systems
 

Recently uploaded

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 

Recently uploaded (20)

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 

Chapter12 - Designing System Interfaces, Controls and Security(Demo Presentation)

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13. Concept of System Sequence Diagram (SSD)  Part of system design. Communicates to OO programmers.  SSD shows interaction between actors and system (global SSD), and among objects (detailed SSD)  SSD specifies flow of data (messages)  Messages are actions (resemble commands) invoked on destination object
  • 14. Global SSD Figure 6-14 SSD of a customer order system
  • 15. Global SSD – loops Figure 6-15 Note: extendedPrice = price * quantity Expected output True/False Condition Loop Input
  • 16. Creating global SSD 1. Start with an activity diagram and/or use case description. 2. Identify the input messages from actor to system. For figuring attributes (input parameters), use class diagram. 3. Identify/apply special conditions (iteration) to input messages, if any. 4. Identify output messages.
  • 17. Creating global SSD (cont.) Account accountNo customerID OrderDetai quantity extendPrice Order orderID TotalAmt Product productID size description CatalogProduct price Catalog catalogID Figure 6-16. Activity diagram of Figure 6-17. Global SSD of the same Figure 5-31 (detail). Create New Order use case, Class diagram of RMO Telephone Scenario at RMO
  • 18. Holycross of Davao College System Analysis and Design (IT11) By: John Ely P. Masculino
  • 19. Designing System Interfaces (UI Vs SI) System Interface (SI) User Interface (UI) - I/O with minimal or no - I/O requiring human human intervention. interaction. - User interface is everything end user comes into contact with while using the system - To the user, the interface is the system
  • 20. Identifying System Interfaces - Inputs from other System (messages, EDI). - Highly automated inputs such as scanners. - Inputs that are from data in external databases. - Outputs to external databases. - Outputs with minimal HCI. - Outputs to other systems. - Real-time connection (both input and output).
  • 21. The full range of inputs and outputs in an information system
  • 22. Designing System Inputs - Identify devices and mechanisms • High-level review of most up-to-date methods to enter data - Identify all system inputs and develop list of data content of each • Provide link between design of application software and design of user and system interfaces - Determine controls and security necessary for each system input
  • 23. Input Devices and Mechanism - Capture data as close to original source as possible - Use electronic devices and automatic entry whenever possible - Avoid human involvement as much as possible - Seek information in electronic form to avoid data reentry - Validate and correct information at entry point
  • 24. Prevalent Input Devices to Avoid Human Data Entry - Magnetic card strip readers - Bar code readers - Optical character recognition readers and scanners - Radio-frequency identification tags - Touch screens and devices - Electronic pens and writing surfaces - Digitizers, such as digital cameras and digital audio devices
  • 25. Defining the Details of System Inputs - Ensure all data inputs are identified and specified correctly • Identifying user and system inputs with OO approach has same tasks as traditional approach • OO diagrams are used instead of DFDs and structure charts • System sequence diagrams identify each incoming message • Design class diagrams and sequence diagrams identify and describe input parameters and verify characteristics of inputs
  • 26. Partial System Sequence Diagram for Payroll System Use Cases
  • 27. System Sequence Diagram for Create New Order
  • 28. Input Messages and Data Parameters from RMO System Sequence Diagram
  • 29. Designing System Outputs - Determine each type of output - Make list of specific system outputs required based on application design - Specify any necessary controls to protect information provided in output - Design and prototype output layout - Ad hoc reports – designed as needed by user
  • 30. Defining the Details of System Outputs  Outputs indicated by messages in sequence diagrams – Originate from internal system objects – Sent to external actors or another external system  Output messages based on an individual object are usually part of methods of that class object  To report on all objects within a class, class-level method is used that works on entire class
  • 31. Table of System Outputs Based on OO Messages
  • 32. Types of reports – Printed reports – Electronic displays – Turnaround documents – Graphical and Multimedia presentation
  • 33. Types of Output Reports  Detailed – Contains detailed transactions or records  Summary – Recaps periodic activity  Exception – Only contains information about nonstandard conditions  Executive – Summary report used for strategic decisions
  • 34. Designing Integrity Controls  Mechanisms and procedures built into a system to safeguard it and information contained within  Integrity controls – Built into application and database system to safeguard information  Security controls
  • 35. Objectives of Integrity Controls - Ensure that only appropriate and correct business transactions occur - Ensure that transactions are recorded and processed correctly - Protect and safeguard assets of the organization • Software • Hardware • Information
  • 36. Points of Security and Integrity Controls
  • 37. Input Integrity Controls – Used with all input mechanisms – Additional level of verification to help reduce input errors – Common control techniques • Field combination controls • Value limit controls • Completeness controls • Data validation controls
  • 38. Database Integrity Controls – Access controls – Data encryption – Transaction controls – Update controls – Backup and recovery protection
  • 39. Output Integrity Controls – Ensure output arrives at proper destination and is correct, accurate, complete, and current – Destination controls - output is channeled to correct people – Completeness, accuracy, and correctness controls – Appropriate information present in output
  • 40. Integrity Controls to Prevent Fraud  Three conditions are present in fraud cases – Personal pressure, such as desire to maintain extravagant lifestyle – Rationalizations, including “I will repay this money” or “I have this coming” – Opportunity, such as unverified cash receipts  Control of fraud requires both manual procedures and computer integrity controls
  • 41. Fraud Risks and Prevention Techniques
  • 42. Designing Security Controls  Security controls protect assets of organization from all threats – External threats such as hackers, viruses, worms, and message overload attacks  Security control objectives – Maintain stable, functioning operating environment for users and application systems (24 x 7) – Protect information and transactions during transmission outside organization (public carriers)
  • 43. Security for Access to Systems  Used to control access to any resource managed by operating system or network  User categories – Unauthorized user – no authorization to access – Registered user – authorized to access system – Privileged user – authorized to administrate system  Organized so that all resources can be accessed with same unique ID/password combination
  • 44. Users and Access Roles to Computer Systems
  • 45. Managing User Access  Most common technique is user ID / password  Authorization – Is user permitted to access?  Access control list – users with rights to access  Authentication – Is user who they claim to be?  Smart card – computer-readable plastic card with embedded security information  Biometric devices – keystroke patterns, fingerprinting, retinal scans, voice characteristics
  • 46. Data Security  Data and files themselves must be secure  Encryption – primary security method – Altering data so unauthorized users cannot view  Decryption – Altering encrypted data back to its original state  Symmetric key – same key encrypts and decrypts  Asymmetric key – different key decrypts  Public key – public encrypts; private decrypts
  • 49. Digital Signatures and Certificates  Encryption of messages enables secure exchange of information between two entities with appropriate keys  Digital signature encrypts document with private key to verify document author  Digital certificate is institution’s name and public key that is encrypted and certified by third party  Certifying authority – VeriSign or Equifax
  • 50. Using a Digital Certificate
  • 51. Secure Transactions  Standard set of methods and protocols for authentication, authorization, privacy, integrity  Secure Sockets Layer (SSL) renamed as Transport Layer  Security (TLS) – protocol for secure channel to send messages over Internet  IP Security (IPSec) – newer standard for transmitting Internet messages securely  Secure Hypertext Transport Protocol (HTTPS or HTTP-S) – standard for transmitting Web pages securely (encryption, digital signing, certificates)