Preview

Design and Security

Good Essays
Open Document
Open Document
702 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Design and Security
Design and Security
David L Story
CMGT 555
July 20th, 2015
MANNIL KRISHNAKUMAR
Design and Security
The design of the user interface for a project along with the security of the interface can be taxing, but with a defined plan and documentation, the user interface can become a very useful tool. The project of making a user interface for leaving feedback that I mentioned in week 2, has been made and is undergoing testing to make sure it works and to add in some security before going live.
While starting the design of the user interface I wanted, I had to take into consideration of the user’s needs, what they would want to see, how they would use it, and what security would be needed in order for it to work. I have made a simple feedback form that the user can enter their data and submit it by email, but the security of the how it transmit data is still not secure. I am diligently working to make the necessary changes to the form so it will be secure when it transmits the data contained within.
I have used the guidelines mentioned in the reading of the class to make sure I covered what was needed to design the interface, with the exceptions of the user being able to customize the interface, having a clear text button, and not entering all data in all field. I will later change this to allow the user more control, but this is the first design, kind of a 1.0 version of the form and interface.
As you can see from the screen shot of the interface, I have included all necessary fields of the information I would like to obtain the users input of service they received and how to make it better or make changes.
During the testing phase of the user interface, I have found three key areas that showed security risk and vulnerability with the user interface and they are:
1. The identification of the security weakness: Did not encrypt the data
2. Assessment of the risk: Analyzing if the data can be breached
3. Develop a plan to reduce or eliminate the risk: researching



References: CAPTCHA, (2010). CAPTCHA: Telling Humans and Computers Apart Automatically. Retrieved from: http://www.captcha.net/ Story, D. (2015). Customer Feedback. Retrieved from: Personal Files on my computer Essentials of Systems Analysis and Design, Fifth Edition, by Joseph S. Valacich, Joey F. George, and Jeffrey A. Hoffer. Published by Pearson. ©2012 Mandel, T. (2013). Golden Rules of User Interface Design. Retrieved from: http://theomandel.com/resources/golden-rules-of-user-interface-design/ Shneiderman, B. (2015). The Eight Golden Rules of Interface Design. Retrieved from: http://www.cs.umd.edu/~ben/goldenrules.html

You May Also Find These Documents Helpful

  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    Valacich, J. S., George, J. F., & Hoffer, J. A. (2009). Essentials of Systems Analysis and Design (4th ed.). Upper Saddle River, NJ: Prentice Hall…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Dennis, A., Wixom, B. H., & Ruth, R. M. (2012). Systems Analysis and Design (5th ed.). Retrieved from the University of Phoenix eBook Collection database.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Service Request SR rm 022

    • 3499 Words
    • 10 Pages

    Valacich, J. S., George, J. F., & Hoffer, J. A. (2012). Essentials of Systems Analysis and Design (5th ed.). Retrieved from The University of Phoenix eBook Collection.…

    • 3499 Words
    • 10 Pages
    Best Essays
  • Better Essays

    Shelly, G. B., & Rosenblatt, H. J. (2010). _Systems analysis and design_. Boston, MA: Course Technology.…

    • 869 Words
    • 4 Pages
    Better Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    Valacich, J. S., George, J. F., and Hoffer, J. A. (2012). Essentials of Systems Analysis and Design (5th ed.). Upper Saddle River, NJ: Pearson Education. Retrieved from the University of Phoenix eBook Collection database.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Using insecure custom administration interfaces, insecure configuration of files on the server, storing sensitive information in the clear text form, using overprivileged process accounts and service accounts…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Good Essays

    | Describe the threats to system and information security and integrityThe possible threats to information security may be: from theft, unauthorised access, accidental file deletion, use of removable storage media; malicious programs (including viruses, trojans), hackers, phishing and identity theft; unsecured and public networks, default passwords and settings, wireless networks, Bluetooth, portable and USB devices.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    3. Imagine the worst possible reports from a system. What is wrong with them? Information has errors and is inconsistent from page to page and from report to report. The layout is difficult to read and understand, and the reports are inflexible, prohibiting the user from changing the information to the users liking. List as many problems as you can. What are the consequences of such reports? Unusual data values or an unavailable device, nonstandard use of GUI widget, bleeding-edge technology, anything that looks like advertising, scrolling text and looping animators, nonstandard link colors, outdated information, slow download times, fixed-formatted text, Displaying long lists as long pages, complex URLs, hidden links, buttons that provide no click feedback, Links that don’t provide enough information and lack of navigation support. Consequences would be unusable reports. What could go wrong as a result? It could not meet the needs of the business. How does the prototyping process help guard against each problem? It allows the user to review the prototype design and to either accept the design or request changes and this method is repeated until the design is accepted. •…

    • 412 Words
    • 12 Pages
    Satisfactory Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    Shelly, G. B., & Rosenblatt, H. J. (2012). User Interface Design. In G. B. Shelly, H. J. Rosenblatt, M. Staudt, & M. Stranz (Eds.), Systems Analysis and Design (Vol. 9th, p. 371). Mason, Ohio: Cengag Learning.…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Web Security Life Cycle

    • 1010 Words
    • 5 Pages

    Application Development: During the development of web applications, things such as poor error handling, and unsecure data transferring can plague the development. Poor error handling could result in malicious users finding much more information about a application than should be revealed and can use that information to gain access to unauthorized areas, while unsecure data transferring could result in data being stolen as it is broadcasted across a network.…

    • 1010 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Authentication - one of the biggest web application weaknesses is the failure to provide a means of strong authentication to verify the end user is whom he/she claims. Prior to accessing a web application, a server may require the end user to authenticate him/herself to identify the user or determine the user's access privileges. To mitigate these risks; employ strong authentication, such as HTTPS, with encrypted credentials, require authentication at specified time intervals or movement between web pages, regularly test authentication and implement authorization.…

    • 1656 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Information System Risks

    • 1562 Words
    • 7 Pages

    The realization of potential risks to an organizations information system has been increased in the past few years. The principles of risk management, vulnerabilities, internal threats, and external threats is the first step in determining which levels of security are necessary to protect and limit the risks to an organizations information system. This essay will describe the principles of risk management as they pertain to the information system and its associated technology of Professional Security Training School. Moreover, this essay will include an exploration of the vulnerabilities of their system, and specifically address the nature of potential internal and external threats, including natural or unintended events that can jeopardize the system. Finally, it will determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted workflow.…

    • 1562 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Information Security

    • 1955 Words
    • 8 Pages

    This research paper provides information about information security. Information security is about protection of important files and data. It is about stopping hackers from breaching over your files and maintaining the privacy, security and confidentiality of a certain files and information. This research also talks about risks and common attacks which may harm, delete, steal and lead to possible loss of your files. These threats can also show the vulnerability of your security that will lead to exposure of your files. In information security, there are three main objectives; these are confidentiality, integrity and availability. Confidentiality means the only person can access the system are the one who need the information while integrity means that the person who can only update and add files are the one who are authorized and lastly, availability is all about time management and when security is requested.…

    • 1955 Words
    • 8 Pages
    Powerful Essays