StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Design Issues in the System (Security) - Essay Example

Cite this document
Summary
In a software system designing, the usability and security are two vital design objectives among many others include but not limited to the functionality, performance, robustness, and reliability. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Design Issues in the System (Security)
Read Text Preview

Extract of sample "Design Issues in the System (Security)"

?Design Issues in the System In a software system designing, the usability and security are two vital design objectives among many others include butnot limited to the functionality, performance, robustness, and reliability. The software designers implement access controls, firewalls, and / or encryption techniques to safeguard computer systems from intruders / hackers. On the other hand, the usability and accessibility guidelines have to be followed to develop easy to use software system. It is vital to balance the usability and security among the various design objectives. As per the given case study, the new system implemented in the restaurant has several issues related to the system security and user interface design. It is pertinent to highlight and review these issues include but are not limited to the locking up of the system after receiving four (4) incorrect either username or password, the system screen automatically gets locked after three (3) minutes of remaining idle, the locked screen can only be opened by the particular / logged in cashier and if the cashier is not available the system is required rebooting to log in any other cashier. These highlighted issues are due to the bad designing of the software application that can be removed or resolved by redesigning the software application. The implemented software application has software design issues include: the system has a design flaw of locking up the system either by inserting incorrect password or leaving the system idle for some time; the system rebooting is a major software design flaw which wastes time as well as irritates the users (Payne and Edwards, 2008). Design Issues Solution The design issues in the deployed software application can be determined by an analysis the design issues and planning the new software design or redesigning the existing software application. There are few guidelines need to be considered while redesigning the currently deployed software application to remove the above highlighted design issues. These guidelines include but are not limited to the locked system should have the capability to be logged in by just changing the username and password by any cashier, as currently the logged in cashier can only unlock the system. In this way, the manager would not be bothered every time the system is locked. Moreover, this design would remove the requirement of rebooting the system, as the system can be unlocked by any cashier after entering his / her correct login name and password. The software application’s security breach can be avoided by following another guideline for securing the software application by implementing security certificates for all the users (cashier / manager / administrator). Software Design Plan The tasks for redesigning the software implemented in the restaurant may include: the analysis of the existing software (highlighting key issues), redesigning of software application keeping in view the highlighted issues, building up a prototype, performing user testing, feedback from the user, prototype refinement and these tasks lead to the final product. The above mentioned tasks need to be performed by the team keeping in view that the existing software has to be modified to correct the design issues, the software should adopt new hardware, the interface of the software has to be upgraded, and overall improving the performance of the software application. The information observed / identified through the analysis of the existing software application should be properly utilized in the implement new software application or modifying the existing software application in such a way with increased security and highly usable software applied. The software testing and validation procedures need to be developed for testing of the software application with objectives to remove the existing design issues. Documentation is one of the key factors in the success of any software application development; therefore, it should be performed properly and document version should be maintained. After seeking approval of the prototype appropriate training should be provided to the users so that the developed / modified software application should be utilized in an efficient and effective manner (Berghammer and Fronk, 2004). As the project success or failure is directly dependent on the time required for software application development, therefore, the time estimation for each of the above listed tasks is one of the critical / crucial matters for a project management team. The duration of the each activity is directly dependent on the size of the software application. It is estimated that the duration of the initial activity (i-e analysis of the existing software application) would be ten (10) days. The re-designing of the software application is estimated to be completed in the next ten (10) days. The initial prototype is expected to be built in approximately fifteen (10) days. This prototype would not have the design issues highlighted in the initial analysis of the existing software application. The testing of the prototype and feedback from the users is dependent on the users of the software application, however, it is expected that the users would perform both the activities within seven (7) days. The comments / feedback provided by the users are required to be incorporated into the user interface and this activity / task would be completed in seven (7) days. Balancing Security and Usability in the System Incorporating security and usability in such a way that neither of the factors should be compromised is highly vital in software engineering. Usually, the security is unusable or difficult to use by its inheritance because the security is mostly dependant on human beings. Therefore, the usability design techniques (i-e user centred technique, system centred design) should carefully be chosen considering the system under development. In this regards, the following statement has been provided by the Alma Whiten while submitting his thesis for Doctorate in 2004: “Many crucial usability problems in computer security are fundamentally different from those in most other consumer software, and usability design techniques need to be carefully adapted and prioritized in order to solve them successfully.” (Whitten, 2004) The computer systems are dominating the human beings day by day and the human beings are going to be dependent on these systems having huge information. Therefore, the information stored on the computer systems need to be secured from the intruders; whereas, on the other hand the secured information should be utilisable even from the users do not have experience / knowledge of using computer systems. As in our case when the computer system has to be used by the customers directly to check-in during busy hours, it might be possible that from the customers some never used computer system before. Therefore, it is highly important that the computer system should be secured as well as usable by balancing both factors. Suggestions for Improving Security and Usability of the Existing System As we have discussed before that the security and usability of the existing system deployed in the restaurant can be improved by following some guidelines of security and usability. The locking up of the computer system’s screen (when the computer system is idle or when trying to login with incorrect password / username) has to be avoided by any means without compromising the security. In this case, it is suggested that the screen should be locked in the above given scenarios, however, the locked screen should be able to log in any cashier into the computer system by putting in the correct username with its password. This can avoid the system rebooting and the system can be used at every time as even with the locked screen the cashier can be logged into the system. References Berghammer, R. and Fronk, A. (2004). Considering Design Tasks in OO – Software Engineering Using Relations and Relations Based Tools. Journal on Relational Methods in Computer Science, Vol. 1, pp. 73 – 92 Whitten, A. (2004). Making Security Usable. School of Computer Science Carnegie Mellon University Payne, B. D. and Edwards, W. K. (2008). A Brief Introduction to Usable Security. Retrieved from: http://www.cc.gatech.edu/~keith/pubs/ieee-intro-usable-security.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Design Issues in the System (Security) Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Design Issues in the System (Security) Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1487564-design-issues-in-the-system-security
(Design Issues in the System (Security) Essay Example | Topics and Well Written Essays - 1250 Words)
Design Issues in the System (Security) Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1487564-design-issues-in-the-system-security.
“Design Issues in the System (Security) Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1487564-design-issues-in-the-system-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Design Issues in the System (Security)

Enterprise Web Application Security Issues and Guidelines

nformation security remains an extremely significant concern throughout the system development life cycle.... In addition, it also ensures that the system development process followed the rules and regulations, legislation and standard application.... The paper "Enterprise Web Application security Issues and Guidelines" discusses that in the past few years, the majority of organizations have shifted their businesses over the internet.... hellip; This paper has discussed some of the important security issues that enterprise application developers experience while implementing these web applications....
13 Pages (3250 words) Research Paper

Systems Analysis and Design

ompanies can prepare for security dangers and issues in the future by raising awareness and teaming amongst employees, making the information technology department the “First Adopter” of disruptive innovations, system segmentation, and system visibility.... he most crucial security issues facing organizations today are data security, employee security, health risks, and physical security.... A 2012 report by statistics organization Securitas showed that organizations, irrespective of size, dealt with data security issues most seriously (Wisegate 5)....
1 Pages (250 words) Essay

Security Architecture & Design models

Coming up with the best security architecture requires the management of an organization to     perform a risk assessment and management process in order to come up with the best security model to secure the system.... The risk assessment will identify the extent of the system if the system is large with interrelated components, the data locations and storage of the system.... Determining if the system uses the Internet for functions like data transfer and identifying all the resources and hardware components being  utilized by the system....
5 Pages (1250 words) Assignment

The Issues Involved in Internet Security

Securing a computer system means the security of the software and hardware, the trustworthiness of the people who use and manage it, and the reliability of the procedures for using and managing the system.... "The Issues Involved in Internet security" paper formulates how an organization can develop confidence in the security of their networked systems when they are opening their systems to Internet access, illustrates why an organization might select such software for mission-critical applications....
7 Pages (1750 words) Assignment

Security in Website Design

This study, security in Website Design, declares that the rapid development of Information and Communication Technology (ICT) has led to the unprecedented growth of the World Wide Web both in terms of coverage and importance.... t was at the face of such an evolving situation that 'security' assumed overwhelming significance in the entire ICT gamut.... ccess control through firewalls, maintaining information confidentiality through strong encryption processes, a range of intrusion detection systems, anti-virus, and anti-phishing software are being deployed to provided security to information on the web and the Internet....
18 Pages (4500 words) Research Paper

Microkernel Operating Systems - Approaches to Operating System Design

This paper "Microkernel Operating Systems - Approaches to Operating System Design" looks at the meaning of the microkernel operating system; approaches to operating system design; examples of microkernel OS; security and reliability concerns of the current OS; the future of microkernels in mainstream OS.... Furthermore, this also permits an escalated steadiness and security.... The userspace contains actual services of the operating system such as user interface, device drivers, file systems, and protocol stacks....
12 Pages (3000 words) Essay

Smart Security Building System

On the other hand, the system facilitates the thermal comfort in the interior of the building by controlling the humidity, temperature, noise, and air purity using air conditioning systems, ventilation, and noise attenuation systems.... The purpose of the system is to optimize, monitor, and control building services such as alarm, CCTV, security, heating, and lighting systems.... … The paper "Smart security Building System" is a delightful example of a term paper on information technology....
11 Pages (2750 words) Term Paper

Issues and Solutions Utilizing an Information Classification Schema

In this paper "Issues and Solutions Utilizing an Information Classification Schema", the author is an Information security Manager tasked with reporting and researching on the protection of the product development information now and in the future.... hellip; Conducting research to find out an appropriate outline to solve a specific problem utilizing an information scheme is challenging due to the lack of a scientific classification scheme for a security outline....
12 Pages (3000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us