SlideShare a Scribd company logo
Chapter 6
Systems Analysis and Design in a Changing World, 7th Edition - Chapter 6 ©2016. Cengage Learning. All rights reserved. 1
Foundations for Systems Design
Chapter 6
Systems Analysis and Design in a Changing World 7th Ed
Satzinger, Jackson & Burd
2
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Chapter 6: Outline
What Is Systems Design?
Design Activities
System Controls and Security
3
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Learning Objectives
Describe systems design and contrast it with
systems analysis
List the documents and models used as inputs
to or output from systems design
Explain each major design activity
Describe security methods and controls
4
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Overview
Analysis says “what” is required and design tells us “how”
the system will be configured and constructed
Chapters 2, 3, 4 and 5 covered systems analysis activities
(requirements)
This chapter introduces system design and the design
activities involved in systems development
Design bridges the gap between requirements to actual
implementation
5
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
What is Systems Design
Analysis provides the starting point for design
Design provides the starting point for
implementation
Analysis and design results are documented to
coordinate the work
Objective of design is to define, organize, and
structure the components of the final solution
to serve as a blue print for construction
6
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Analysis to Design to Implementation
7
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Design Models
Design is a model building activity
The formality of the project will dictate the
type, complexity, and depth of models
Agile/iteration projects typically build fewer
models, but models are still created
Jumping to programming without design often
causes less than optimum solutions and may
require rework
8
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Analysis
Models to
Design Models
9
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Design Activities
Design activities correspond to components of
the new system
The environment
Application components
User interface
Database
Software classes and methods
10
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Design Activities and Iterations
11
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Describe the Environment
Two key elements in the environment
Communications with External Systems
Message formats
Web and networks
Communication protocols
Security methods
Error detection and recovery
Conforming to an existing Technology Architecture
Discover and describe existing architecture
Chapter 7 provides more details
12
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Design the Application Components
Application component is a well defined unit of
software that performs some function(s)
Issues involve how to package components
including
Scope and size – what are the functions,
boundaries, interfaces?
Programming language – what are the accepted
languages?
Build or buy – is an acceptable version available to
purchase?
13
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Design the User Interface
To the user, the User Interface is the system.
The user interface has large impact of user
productivity
Includes both Analysis and Design tasks
Requires heavy user involvement
Current needs require multiple user interfaces
Many different devices and environments
14
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Typical
models for
user
interface
design
15
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Design the Database
By definition, an Information System requires
data – usually in a database
Current technology frequently use Relational
Database Management Systems (RDBMS)
Requires converting the data model to a
relational database
Requires addressing of many other technical
issues
Throughput and response time
Security
16
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Design Software Classes and Methods
AKA Detailed Design
A model building activity
Design Class Diagram
Sequence Diagrams
State-Machine Diagrams
17
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
System Controls and Security
Integrity Controls
Controls that maintain integrity of inputs, outputs
and data and programs
Security Controls
Controls that protect the assets from threats,
internal and external
18
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Designing Integrity Controls
Integrated into application programs and DBMS
Objectives of Integrity Controls
Ensure that only appropriate and correct business
transactions are accepted
Ensure that transactions are recorded and
processed correctly
To protect and safeguard assets such as the
database
19
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Input Controls
Prevent invalid or erroneous data from entering the
system
Value Limit Controls
Check the range of inputs for reasonableness
Completeness Controls
Ensure all the data has been entered
Data Validation Controls
Ensure that specific data values are correct
Field Combination Controls
Ensure data is correct based on relationships between fields
20
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Output Controls
To ensure that output arrives at proper
destination (for authorized eyes) and is
accurate, current, and complete
Examples
Physical access to printers and display devices
Discarded data – protect from “dumpster diving”
Labels on printed and electronic output to correctly
identify source of data
21
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Redundancy, Backup and Recovery
Protect data and systems from catastrophes
Databases
Hardware
Software applications
Networks
On-site versus off-site copies
22
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Fraud Prevention
Critical to prevent
internal fraud,
embezzlement, or loss
Fraud triangle
Opportunity
Motive
Rationalization
23
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Fraud Risk – Factors and Techniques
Factors affecting fraud risk Risk-reduction techniques
Separation of duties Design systems so those with asset custody have limited access
to related records. Also, ensure that no one has sufficient
system access to commit and cover up a fraud.
Records and audit trails Record all transactions an changes in asset status. Log all
changes to records and databases, and restrict log access to a
few trusted persons.
Monitoring Incorporate regular and systematic procedures to review
records and logs for unusual transactions, accesses, and other
patterns.
Asset control and
reconciliation
Limit physical access to valuable assets, such as inventory, and
periodically reconcile physical asset counts with related records.
Security Design security features into individual systems and supporting
infrastructure. Review and test security features frequently. Use
outside consultants to conduct penetration testing attack and
fraud vectors from external and internal sources.
24
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Designing Security Controls (1 of 2)
Protect all assets against external threats
Other objectives
Protect and maintain a stable, functioning operating
environment 24/7 (equipment, operating systems, DBMSs)
Protect information and transactions during transmission
across networks and Internet
25
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Designing Security Controls (2 of 2)
Access Controls – Limit a person’s ability to access
servers, files, data, applications
Authentication – to identify users
Multifactor Authentication
Access control list – list of valid users
Authorization – authenticated user’s list of permission level
for each resource
Registered Users – those with authorization
Unauthorized Users – anyone not registered
Privileged Users – those that maintain lists and systems
26
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Data Encryption
Method to secure data – stored or in transmission
Encryption – alter data so it is unrecognizable
Decryption – converted encrypted data back to
readable format
Encryption Algorithm – mathematical
transformation of the data
Encryption Key – a long data string that allows the
same algorithm to produce unique encryptions
27
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Digital Signatures and Certificates
Digital Signature – technique where a document is
encrypted using a private key
Note – implements previous slide, but in reverse
Document is encrypted with private key, but then can
only be decrypted with correct public key
Digital Certificate – An organizations name and
public that is encrypted and certified by an
authorized third party
Certifying Authority – the authorized third party
Widely known and accepted – built into Web browsers
28
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Secure Transactions
Secure Sockets Layer (SSL) – standard set of
protocols for authentication and authorization
Transport Layer Security (TLS) – an Internet
standard equivalent to SSL
IP Security (IPSec) – Internet security protocol at
a low-level transmission
Hypertext Transfer Protocol Secure (HTTPS) –
Internet standard to transmit Web pages
29
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Summary (1 of 3)
This chapter introduces the concept of Systems
Design
Analysis is fact finding and modeling
Design is modeling to specify how system will be
implemented
Design is bridge between analysis an
implementation
30
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Summary (2 of 3)
Activities of Systems Design
Describe the environment
Design the application components
Design the User Interface
Design the database
Design the software classes and methods
31
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
Summary (3 of 3)
System Controls and Security
Integrity Controls
Input controls
Output controls
Backup and recovery
Fraud prevention
Security Controls
Access controls
Data encryption
Digital signatures and certificates
Secure transactions
32
Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.

More Related Content

What's hot

An Introduction to Software Architecture
An Introduction to Software ArchitectureAn Introduction to Software Architecture
An Introduction to Software Architecture
RahimLotfi
 
Documenting Software Architectures
Documenting Software ArchitecturesDocumenting Software Architectures
Documenting Software Architectures
Paulo Gandra de Sousa
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution Security
Alan McSweeney
 
Ch04 agile development models
Ch04 agile development modelsCh04 agile development models
Ch04 agile development models
Noor Ul Hudda Memon
 
Ch 6
Ch 6Ch 6
Introduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTUREIntroduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTURE
Ivano Malavolta
 
Chap03
Chap03Chap03
Chapter 6
Chapter 6Chapter 6
Chapter 6
Ahmed Magdy
 
Software Architecture: views and viewpoints
Software Architecture: views and viewpointsSoftware Architecture: views and viewpoints
Software Architecture: views and viewpoints
Henry Muccini
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1
Mohammed Romi
 
Cobit5 introduction
Cobit5 introductionCobit5 introduction
Cobit5 introduction
Markus Yaldu
 
Software Architecture
Software ArchitectureSoftware Architecture
Software Architecture
Dharmalingam Ganesan
 
Ch22 project management
Ch22 project managementCh22 project management
Ch22 project management
software-engineering-book
 
System Analysis and Design
System Analysis and Design System Analysis and Design
System Analysis and Design Matthew McKenzie
 
Unit iii(part c - user interface design)
Unit   iii(part c - user interface design)Unit   iii(part c - user interface design)
Unit iii(part c - user interface design)
BALAJI A
 
Introduction to-data-mining chapter 1
Introduction to-data-mining  chapter 1Introduction to-data-mining  chapter 1
Introduction to-data-mining chapter 1
Mahmoud Alfarra
 
Aspect-Oriented Software Development with Use Cases
Aspect-Oriented Software Development with Use CasesAspect-Oriented Software Development with Use Cases
Aspect-Oriented Software Development with Use Cases
www.myassignmenthelp.net
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 

What's hot (20)

An Introduction to Software Architecture
An Introduction to Software ArchitectureAn Introduction to Software Architecture
An Introduction to Software Architecture
 
User centered Design
User centered DesignUser centered Design
User centered Design
 
Documenting Software Architectures
Documenting Software ArchitecturesDocumenting Software Architectures
Documenting Software Architectures
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution Security
 
Ch04 agile development models
Ch04 agile development modelsCh04 agile development models
Ch04 agile development models
 
Ch 6
Ch 6Ch 6
Ch 6
 
Introduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTUREIntroduction to SOFTWARE ARCHITECTURE
Introduction to SOFTWARE ARCHITECTURE
 
Chap03
Chap03Chap03
Chap03
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Sadcw 6e chapter1
Sadcw 6e chapter1Sadcw 6e chapter1
Sadcw 6e chapter1
 
Software Architecture: views and viewpoints
Software Architecture: views and viewpointsSoftware Architecture: views and viewpoints
Software Architecture: views and viewpoints
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1
 
Cobit5 introduction
Cobit5 introductionCobit5 introduction
Cobit5 introduction
 
Software Architecture
Software ArchitectureSoftware Architecture
Software Architecture
 
Ch22 project management
Ch22 project managementCh22 project management
Ch22 project management
 
System Analysis and Design
System Analysis and Design System Analysis and Design
System Analysis and Design
 
Unit iii(part c - user interface design)
Unit   iii(part c - user interface design)Unit   iii(part c - user interface design)
Unit iii(part c - user interface design)
 
Introduction to-data-mining chapter 1
Introduction to-data-mining  chapter 1Introduction to-data-mining  chapter 1
Introduction to-data-mining chapter 1
 
Aspect-Oriented Software Development with Use Cases
Aspect-Oriented Software Development with Use CasesAspect-Oriented Software Development with Use Cases
Aspect-Oriented Software Development with Use Cases
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
 

Similar to Sadcw 7e chapter06-done

Clone of an organization
Clone of an organizationClone of an organization
Clone of an organization
IRJET Journal
 
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptxChapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
anumayived
 
Mis
MisMis
SADCW_7e_Chapter02.pptx
SADCW_7e_Chapter02.pptxSADCW_7e_Chapter02.pptx
SADCW_7e_Chapter02.pptx
SiphiweMakaNtandOlwe
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
MuhammadTalha436
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
MarissaPedragosa
 
system development life cycle
system development life cyclesystem development life cycle
system development life cycle
SuhleemAhmd
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
Denodo
 
VTU - MIS Module 4 - SDLC
VTU - MIS Module 4 - SDLCVTU - MIS Module 4 - SDLC
VTU - MIS Module 4 - SDLC
Priya Diana Mercy
 
BIS Ch 4.ppt
BIS Ch 4.pptBIS Ch 4.ppt
BIS Ch 4.ppt
biruktesfaye27
 
SAD REPORTING GROUP 2BCFGGGGHHHJJJJ.pptx
SAD REPORTING GROUP 2BCFGGGGHHHJJJJ.pptxSAD REPORTING GROUP 2BCFGGGGHHHJJJJ.pptx
SAD REPORTING GROUP 2BCFGGGGHHHJJJJ.pptx
JakeariesMacarayo
 
James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
David Julian
 
Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Dhairya Joshi
 
Mba it unit 3 ppt
Mba it unit 3 pptMba it unit 3 ppt
Mba it unit 3 ppt
Suguna Ramya
 
Mba it unit 3 ppt
Mba it unit 3 pptMba it unit 3 ppt
Mba it unit 3 ppt
Suguna Ramya
 
Gr 4 system theory and methodologies
Gr 4   system theory and methodologiesGr 4   system theory and methodologies
Gr 4 system theory and methodologies
university of education,Lahore
 

Similar to Sadcw 7e chapter06-done (20)

Sadcw 6e chapter6
Sadcw 6e chapter6Sadcw 6e chapter6
Sadcw 6e chapter6
 
Clone of an organization
Clone of an organizationClone of an organization
Clone of an organization
 
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptxChapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
 
Mis
MisMis
Mis
 
SADCW_7e_Chapter02.pptx
SADCW_7e_Chapter02.pptxSADCW_7e_Chapter02.pptx
SADCW_7e_Chapter02.pptx
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
 
system development life cycle
system development life cyclesystem development life cycle
system development life cycle
 
Final
FinalFinal
Final
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
 
VTU - MIS Module 4 - SDLC
VTU - MIS Module 4 - SDLCVTU - MIS Module 4 - SDLC
VTU - MIS Module 4 - SDLC
 
BIS Ch 4.ppt
BIS Ch 4.pptBIS Ch 4.ppt
BIS Ch 4.ppt
 
SAD REPORTING GROUP 2BCFGGGGHHHJJJJ.pptx
SAD REPORTING GROUP 2BCFGGGGHHHJJJJ.pptxSAD REPORTING GROUP 2BCFGGGGHHHJJJJ.pptx
SAD REPORTING GROUP 2BCFGGGGHHHJJJJ.pptx
 
James hall ch 14
James hall ch 14James hall ch 14
James hall ch 14
 
System design
System designSystem design
System design
 
Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7
 
Mba it unit 3 ppt
Mba it unit 3 pptMba it unit 3 ppt
Mba it unit 3 ppt
 
Mba it unit 3 ppt
Mba it unit 3 pptMba it unit 3 ppt
Mba it unit 3 ppt
 
Mba it unit 3 ppt
Mba it unit 3 pptMba it unit 3 ppt
Mba it unit 3 ppt
 
Gr 4 system theory and methodologies
Gr 4   system theory and methodologiesGr 4   system theory and methodologies
Gr 4 system theory and methodologies
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Sadcw 7e chapter06-done

  • 1. Chapter 6 Systems Analysis and Design in a Changing World, 7th Edition - Chapter 6 ©2016. Cengage Learning. All rights reserved. 1
  • 2. Foundations for Systems Design Chapter 6 Systems Analysis and Design in a Changing World 7th Ed Satzinger, Jackson & Burd 2 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 3. Chapter 6: Outline What Is Systems Design? Design Activities System Controls and Security 3 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 4. Learning Objectives Describe systems design and contrast it with systems analysis List the documents and models used as inputs to or output from systems design Explain each major design activity Describe security methods and controls 4 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 5. Overview Analysis says “what” is required and design tells us “how” the system will be configured and constructed Chapters 2, 3, 4 and 5 covered systems analysis activities (requirements) This chapter introduces system design and the design activities involved in systems development Design bridges the gap between requirements to actual implementation 5 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 6. What is Systems Design Analysis provides the starting point for design Design provides the starting point for implementation Analysis and design results are documented to coordinate the work Objective of design is to define, organize, and structure the components of the final solution to serve as a blue print for construction 6 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 7. Analysis to Design to Implementation 7 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 8. Design Models Design is a model building activity The formality of the project will dictate the type, complexity, and depth of models Agile/iteration projects typically build fewer models, but models are still created Jumping to programming without design often causes less than optimum solutions and may require rework 8 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 9. Analysis Models to Design Models 9 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 10. Design Activities Design activities correspond to components of the new system The environment Application components User interface Database Software classes and methods 10 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 11. Design Activities and Iterations 11 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 12. Describe the Environment Two key elements in the environment Communications with External Systems Message formats Web and networks Communication protocols Security methods Error detection and recovery Conforming to an existing Technology Architecture Discover and describe existing architecture Chapter 7 provides more details 12 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 13. Design the Application Components Application component is a well defined unit of software that performs some function(s) Issues involve how to package components including Scope and size – what are the functions, boundaries, interfaces? Programming language – what are the accepted languages? Build or buy – is an acceptable version available to purchase? 13 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 14. Design the User Interface To the user, the User Interface is the system. The user interface has large impact of user productivity Includes both Analysis and Design tasks Requires heavy user involvement Current needs require multiple user interfaces Many different devices and environments 14 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 15. Typical models for user interface design 15 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 16. Design the Database By definition, an Information System requires data – usually in a database Current technology frequently use Relational Database Management Systems (RDBMS) Requires converting the data model to a relational database Requires addressing of many other technical issues Throughput and response time Security 16 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 17. Design Software Classes and Methods AKA Detailed Design A model building activity Design Class Diagram Sequence Diagrams State-Machine Diagrams 17 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 18. System Controls and Security Integrity Controls Controls that maintain integrity of inputs, outputs and data and programs Security Controls Controls that protect the assets from threats, internal and external 18 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 19. Designing Integrity Controls Integrated into application programs and DBMS Objectives of Integrity Controls Ensure that only appropriate and correct business transactions are accepted Ensure that transactions are recorded and processed correctly To protect and safeguard assets such as the database 19 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 20. Input Controls Prevent invalid or erroneous data from entering the system Value Limit Controls Check the range of inputs for reasonableness Completeness Controls Ensure all the data has been entered Data Validation Controls Ensure that specific data values are correct Field Combination Controls Ensure data is correct based on relationships between fields 20 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 21. Output Controls To ensure that output arrives at proper destination (for authorized eyes) and is accurate, current, and complete Examples Physical access to printers and display devices Discarded data – protect from “dumpster diving” Labels on printed and electronic output to correctly identify source of data 21 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 22. Redundancy, Backup and Recovery Protect data and systems from catastrophes Databases Hardware Software applications Networks On-site versus off-site copies 22 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 23. Fraud Prevention Critical to prevent internal fraud, embezzlement, or loss Fraud triangle Opportunity Motive Rationalization 23 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 24. Fraud Risk – Factors and Techniques Factors affecting fraud risk Risk-reduction techniques Separation of duties Design systems so those with asset custody have limited access to related records. Also, ensure that no one has sufficient system access to commit and cover up a fraud. Records and audit trails Record all transactions an changes in asset status. Log all changes to records and databases, and restrict log access to a few trusted persons. Monitoring Incorporate regular and systematic procedures to review records and logs for unusual transactions, accesses, and other patterns. Asset control and reconciliation Limit physical access to valuable assets, such as inventory, and periodically reconcile physical asset counts with related records. Security Design security features into individual systems and supporting infrastructure. Review and test security features frequently. Use outside consultants to conduct penetration testing attack and fraud vectors from external and internal sources. 24 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 25. Designing Security Controls (1 of 2) Protect all assets against external threats Other objectives Protect and maintain a stable, functioning operating environment 24/7 (equipment, operating systems, DBMSs) Protect information and transactions during transmission across networks and Internet 25 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 26. Designing Security Controls (2 of 2) Access Controls – Limit a person’s ability to access servers, files, data, applications Authentication – to identify users Multifactor Authentication Access control list – list of valid users Authorization – authenticated user’s list of permission level for each resource Registered Users – those with authorization Unauthorized Users – anyone not registered Privileged Users – those that maintain lists and systems 26 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 27. Data Encryption Method to secure data – stored or in transmission Encryption – alter data so it is unrecognizable Decryption – converted encrypted data back to readable format Encryption Algorithm – mathematical transformation of the data Encryption Key – a long data string that allows the same algorithm to produce unique encryptions 27 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 28. Digital Signatures and Certificates Digital Signature – technique where a document is encrypted using a private key Note – implements previous slide, but in reverse Document is encrypted with private key, but then can only be decrypted with correct public key Digital Certificate – An organizations name and public that is encrypted and certified by an authorized third party Certifying Authority – the authorized third party Widely known and accepted – built into Web browsers 28 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 29. Secure Transactions Secure Sockets Layer (SSL) – standard set of protocols for authentication and authorization Transport Layer Security (TLS) – an Internet standard equivalent to SSL IP Security (IPSec) – Internet security protocol at a low-level transmission Hypertext Transfer Protocol Secure (HTTPS) – Internet standard to transmit Web pages 29 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 30. Summary (1 of 3) This chapter introduces the concept of Systems Design Analysis is fact finding and modeling Design is modeling to specify how system will be implemented Design is bridge between analysis an implementation 30 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 31. Summary (2 of 3) Activities of Systems Design Describe the environment Design the application components Design the User Interface Design the database Design the software classes and methods 31 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.
  • 32. Summary (3 of 3) System Controls and Security Integrity Controls Input controls Output controls Backup and recovery Fraud prevention Security Controls Access controls Data encryption Digital signatures and certificates Secure transactions 32 Systems Analysis and Design in a Changing World, 7th Ed - Chapter 6 ©2016. Cengage Learning. All rights reserved.