Examine how system balanced security and usability

Assignment Help Computer Network Security
Reference no: EM13769944

A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register. The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart.

After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive.

Write a five to eight (5-8) page paper in which you:

Analyze the new system and determine the design issues with this new system.

Describe how you would correct the design issues with the system to make the restaurant managers happy.

Create a design plan that:

Lists and explains the tasks associated with improving this interface.

Contains at least six (6) tasks.

Includes realistic time estimates for each task to be completed.

Analyzes the development of the system in your plan.

Analyzes the testing of the system in your plan.

Analyzes the implementation of the system in your plan.

Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

Suggest changes that could be made to the security of this system to still meet security objectives but make the system more usable.

Use Microsoft Visio or an open source alternative, Dia, to create a graphical representation of your proposed interface. Note: The graphically depicted solution is not included in the required page length.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13769944

Questions Cloud

How has the ada been changed by the ada amendments act : How has the ADA been changed by the ADA Amendments Act of 2008? Did Congress get it right this time? Will the new law be more effective at protecting employees with disabilities
Identify an appropriate sampling frame for each : Identify an appropriate sampling frame for each of the following populations. If there is no appropriate sampling frame, explain why. Students at a particular college or university b. adults living in the state of Maryland households in Annapolis, Ma..
What are some arguments in favor of affirmative action : What are some arguments in favor of affirmative action? Against it? What is your current view of affirmative action? Why? Does your view differ depending on the measures used to achieve affirmative action goals
Air pollution particles atmosphere : In this unit, you learn how air pollution particles move through the atmosphere. The movement of air pollution across states, countries, and the globe creates some interesting policy issues. For example, states have sued power plants in other stat..
Examine how system balanced security and usability : Analyzes the implementation of the system in your plan. Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.
What should be done regarding applicants : Would you advise an employer that operates retail clothing stores to drug test? If so, under what circumstances? Using what procedures? What should be done regarding applicants or employees who test positive
Would it tend to result in adverse impact : Suppose that an employer has a close working relationship with your college and primarily recruits from there for professional positions. What would be the consequence of that recruiting strategy? Would it tend to result in adverse impact
Negative impact of energy resource on the environment : Does the use of these types of energy resource have a negative impact on the environment in your area?
Who take legal action against their employers : Do you think that most employees who take legal action against their employers have valid claims or are looking to "get something for nothing?" What is the basis for your opinion

Reviews

Write a Review

Computer Network Security Questions & Answers

  Computer security incident

Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers

  Program to encrypt messages using the caesar cypher

The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext

  Technical versus soft skills

Suppose that there is some consensus with basic premise that most skills can be learnt, which would you expect to be the more productive task,

  Controls to detect or prevent salami attacks

List three controls that could be applied to detect or prevent salami attacks. Modularity can have a negative as well as a positive effect. A program that is overmodularized performs its operations in very small modules.

  Des operating on a general plaintext input

DES operating on a general plaintext input 1st with key K1 and then with key K2 manufactures the same output as if K2 were first used and then K1.

  Discuss the current it cybersecurity policy

Current policy: Discuss the current (as per the case study) IT cybersecurity policy. New technology: Describe the functionality of the new technology selected for implementation and the challenges associated with the current cybersecurity policy

  How system with capabilities as its access control mechanism

In general, do capabilities offer more or less protection against Trojan horses than do access control lists? Justify your answer in light of the theoretical equivalence of ACLs and C-Lists.

  Etherpad shared document editing system

Etherpad shared document editing system and community version of the Alfresco Enterprise Content Management System

  What can employees do to protect against attacks

What can employees do to protect against intrusion and attacks? Complete the following for this assignment:Research various security tools that an employee can use to keep his or her data safe or to thwart denial of service attacks.

  Discuss symmetric and asymmetric key encryption

A short introduction to SSH, explaining why it is the preferredway of logging into a remotemachine-this explanation will need to discuss symmetric and asymmetric key encryption.

  Why are background checks important to information security

Be sure to list your two required references at the end of your post. References must be in APA citation format. Answer the following questions below must be a minimum of 300 words combined. Why are background checks important to information securi..

  Identify the critical business functions

Identify the Critical Business Functions (CBFs) a midsized organization would need to restore after a catastrophic failure occurs, and suggest the ways the organization would determine the order in which it restores its CBFs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd