Examine how system balanced security and usability

Assignment Help Computer Network Security
Reference no: EM13769944

A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register. The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart.

After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive.

Write a five to eight (5-8) page paper in which you:

Analyze the new system and determine the design issues with this new system.

Describe how you would correct the design issues with the system to make the restaurant managers happy.

Create a design plan that:

Lists and explains the tasks associated with improving this interface.

Contains at least six (6) tasks.

Includes realistic time estimates for each task to be completed.

Analyzes the development of the system in your plan.

Analyzes the testing of the system in your plan.

Analyzes the implementation of the system in your plan.

Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

Suggest changes that could be made to the security of this system to still meet security objectives but make the system more usable.

Use Microsoft Visio or an open source alternative, Dia, to create a graphical representation of your proposed interface. Note: The graphically depicted solution is not included in the required page length.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13769944

Questions Cloud

How has the ada been changed by the ada amendments act : How has the ADA been changed by the ADA Amendments Act of 2008? Did Congress get it right this time? Will the new law be more effective at protecting employees with disabilities
Identify an appropriate sampling frame for each : Identify an appropriate sampling frame for each of the following populations. If there is no appropriate sampling frame, explain why. Students at a particular college or university b. adults living in the state of Maryland households in Annapolis, Ma..
What are some arguments in favor of affirmative action : What are some arguments in favor of affirmative action? Against it? What is your current view of affirmative action? Why? Does your view differ depending on the measures used to achieve affirmative action goals
Air pollution particles atmosphere : In this unit, you learn how air pollution particles move through the atmosphere. The movement of air pollution across states, countries, and the globe creates some interesting policy issues. For example, states have sued power plants in other stat..
Examine how system balanced security and usability : Analyzes the implementation of the system in your plan. Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.
What should be done regarding applicants : Would you advise an employer that operates retail clothing stores to drug test? If so, under what circumstances? Using what procedures? What should be done regarding applicants or employees who test positive
Would it tend to result in adverse impact : Suppose that an employer has a close working relationship with your college and primarily recruits from there for professional positions. What would be the consequence of that recruiting strategy? Would it tend to result in adverse impact
Negative impact of energy resource on the environment : Does the use of these types of energy resource have a negative impact on the environment in your area?
Who take legal action against their employers : Do you think that most employees who take legal action against their employers have valid claims or are looking to "get something for nothing?" What is the basis for your opinion

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are the risks of implementing this technique

list one way to prevent malware from executing in Windows from directories that are not normally used for executables. What are the risks of implementing this technique?

  How clark -wilson model is implemented on computer system

Assume that the Clark -Wilson model is implemented on a computer system. Could a computer virus that scrambled constrained data items be introduced into the system?

  It infrastructure management what to do for task 2a

what to do for task 2a 15 ltbrgt ltbrgtsubmit your enterprise architect blog as a single page with the web address of

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Identify and prioritize it security controls

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization

  What if ipsec provides security at the network layer

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP?

  Design a network for the local business

Design a network for the local business based on the information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building.

  Principles and theory of security management

so far this week we have discussed three types of security: retail, institutional, and industrial. I think that there is a little bit of confusion still about what the differences are between each of these types of security because we are looking..

  Protecting intellectual property rights in software

Explain the reason of each of these approaches and explain how each of them can be used to protect property rights in software. Please include any experiences you have had with these methods.

  Is protocol secure for sharing secrets on server computer

Suppose that Alice shares secret with her company's server computer. When Alice is on trip, she tries to store important message in CEO's account directory. Is this protocol secure? If not, how do you feel it could be modified to make it so?

  Problems of hacking

Question 1: Describe what hacking of memory or hacking of RAM means. Question 2: Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

  How do you plan to validate the data after acquiring it

What diplomatic strategies should you use with the network administrator and what privacy issues might be a concern with bank records (bank account numbers, customer names, etc.)?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd