版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
SystemsAnalysisandDesigninaChangingWorld,FourthEditionSystemsAnalysisandDesigninaChangingWorld,4thEdition2LearningObjectivesDiscussexamplesofsysteminterfacesfoundininformationsystemsDefinesysteminputsandoutputsbasedontherequirementsoftheapplicationprogramDesignprintedandon-screenreportsappropriateforrecipientsSystemsAnalysisandDesigninaChangingWorld,4thEdition3LearningObjectives(continued)ExplaintheimportanceofintegritycontrolsIdentifyrequiredintegritycontrolsforinputs,outputs,data,andprocessingDiscussissuesrelatedtosecuritythataffectthedesignandoperationofinformationsystemsSystemsAnalysisandDesigninaChangingWorld,4thEdition4OverviewThischapterfocusesonsysteminterfaces,systemoutputs,andsystemcontrolsthatdonotrequiremuchhumaninteractionManysysteminterfacesareelectronictransmissionsorpaperoutputstoexternalagentsSystemdevelopersneedtodesignandimplementintegrityandsecuritycontrolstoprotectsystemanditsdataOutsidethreatsfromInternetande-commercearegrowingconcernSystemsAnalysisandDesigninaChangingWorld,4thEdition5IdentifyingSystemInterfacesSysteminterfacesarebroadlydefinedasinputsoroutputswithminimalornohumaninterventionInputsfromothersystems(messages,EDI)HighlyautomatedinputdevicessuchasscannersInputsthatarefromdatainexternaldatabasesOutputstoexternaldatabasesOutputswithminimalHCIOutputstoothersystemsReal-timeconnections(bothinputandoutput)SystemsAnalysisandDesigninaChangingWorld,4thEdition6FullRangeofInputsandOutputsSystemsAnalysisandDesigninaChangingWorld,4thEdition7eXtensibleMarkupLanguage(XML)ExtensionofHTMLthatembedsself-defineddatastructuresintextualmessagesTransactionthatcontainsdatafieldscanbesentwithXMLcodestodefinemeaningofdatafieldsXMLprovidescommonsystem-to-systeminterfaceXMLissimpleandreadablebypeopleWebservicesisbasedonXMLtosendbusinesstransactionsoverInternetSystemsAnalysisandDesigninaChangingWorld,4thEdition8System-to-SystemInterfaceBasedonXMLSystemsAnalysisandDesigninaChangingWorld,4thEdition9DesignofSystemInputsIdentifydevicesandmechanismsusedtoenterinputHigh-levelreviewofmostup-to-datemethodstoenterdataIdentifyallsysteminputsanddeveloplistofdatacontentforeachProvidelinkbetweendesignofapplicationsoftwareanddesignofuserandsysteminterfacesDeterminecontrolsandsecuritynecessaryforeachsysteminputSystemsAnalysisandDesigninaChangingWorld,4thEdition10InputDevicesandMechanismsCapturedataasclosetooriginalsourceaspossibleUseelectronicdevicesandautomaticentrywheneverpossibleAvoidhumaninvolvementasmuchaspossibleSeekinformationinelectronicformtoavoiddatare-entryValidateandcorrectinformationatentrypointSystemsAnalysisandDesigninaChangingWorld,4thEdition11PrevalentInputDevices
toAvoidHumanDataEntryMagneticcardstripreadersBarcodereadersOpticalcharacterrecognitionreadersandscannersRadio-frequencyidentificationtagsTouchscreensanddevicesElectronicpensandwritingsurfacesDigitizers,suchasdigitalcamerasanddigitalaudiodevicesSystemsAnalysisandDesigninaChangingWorld,4thEdition12DefiningtheDetailsofSystemInputsEnsurealldatainputsareidentifiedandspecifiedcorrectlyCanusetraditionalstructuredmodelsIdentifyautomationboundaryUseDFDfragmentsSegmentbyprogramboundariesExaminestructurechartsAnalyzeeachmoduleanddatacoupleListindividualdatafieldsSystemsAnalysisandDesigninaChangingWorld,4thEdition13AutomationBoundaryona
System-LevelDFDSystemsAnalysisandDesigninaChangingWorld,4thEdition14CreateNewOrderDFDwith
anAutomationBoundarySystemsAnalysisandDesigninaChangingWorld,4thEdition15ListofInputsforCustomerSupportSystemSystemsAnalysisandDesigninaChangingWorld,4thEdition16StructureChartforCreateNewOrder
(Figure14-6)SystemsAnalysisandDesigninaChangingWorld,4thEdition17DataFlows,DataCouples,andDataElementsMakingUpInputs(Figure14-7)SystemsAnalysisandDesigninaChangingWorld,4thEdition18UsingObject-OrientedModelsIdentifyinguserandsysteminputswithOOapproachhassametasksastraditionalapproachOOdiagramsareusedinsteadofDFDsandstructurechartsSystemsequencediagramsidentifyeachincomingmessageDesignclassdiagramsandsequencediagramsidentifyanddescribeinputparametersandverifycharacteristicsofinputsSystemsAnalysisandDesigninaChangingWorld,4thEdition19PartialSystemSequenceDiagramfor
PayrollSystemUseCases(Figure14-8)SystemsAnalysisandDesigninaChangingWorld,4thEdition20SystemSequenceDiagramfor
CreateNewOrderSystemsAnalysisandDesigninaChangingWorld,4thEdition21InputMessagesandDataParameters
fromRMOSystemSequenceDiagram(Figure14-10)SystemsAnalysisandDesigninaChangingWorld,4thEdition22DesigningSystemOutputsDetermineeachtypeofoutputMakelistofspecificsystemoutputsrequiredbasedonapplicationdesignSpecifyanynecessarycontrolstoprotectinformationprovidedinoutputDesignandprototypeoutputlayoutAdhocreports–designedasneededbyuserSystemsAnalysisandDesigninaChangingWorld,4thEdition23DefiningtheDetailsofSystemOutputsTypeofreportsPrintedreportsElectronicdisplaysTurnarounddocumentsCanusetraditionalstructuredmodelstoidentifyoutputsDataflowscrossingautomationboundaryDatacouplesandreportdatarequirementsonstructurechartSystemsAnalysisandDesigninaChangingWorld,4thEdition24TableofSystemOutputsBasedonTraditionalStructuredApproach(Figure14-11)SystemsAnalysisandDesigninaChangingWorld,4thEdition25UsingObject-OrientedModelsOutputsindicatedbymessagesinsequencediagramsOriginatefrominternalsystemobjectsSenttoexternalactorsoranotherexternalsystemOutputmessagesbasedonanindividualobjectareusuallypartofmethodsofthatclassobjectToreportonallobjectswithinaclass,class-levelmethodisusedthatworksonentireclassSystemsAnalysisandDesigninaChangingWorld,4thEdition26TableofSystemOutputsBased
onOOMessages(Figure14-12)SystemsAnalysisandDesigninaChangingWorld,4thEdition27DesigningReports,Statements,andTurnaroundDocumentsPrintedversuselectronicTypesofoutputreportsDetailedSummaryExceptionExecutiveInternalversusexternalGraphicalandmultimediapresentationSystemsAnalysisandDesigninaChangingWorld,4thEdition28RMOSummaryReportwith
DrillDowntotheDetailedReportSystemsAnalysisandDesigninaChangingWorld,4thEdition29SampleBarChartandPieChartReportsSystemsAnalysisandDesigninaChangingWorld,4thEdition30FormattingReportsWhatisobjectiveofreport?Whoistheintendedaudience?Whatismediaforpresentation?AvoidinformationoverloadFormatconsiderationsincludemeaningfulheadings,dateofinformation,datereportproduced,pagenumbersSystemsAnalysisandDesigninaChangingWorld,4thEdition31DesigningIntegrityControlsMechanismsandproceduresbuiltintoasystemtosafeguarditandinformationcontainedwithinIntegritycontrolsBuiltintoapplicationanddatabasesystemtosafeguardinformationSecuritycontrolsBuiltintooperatingsystemandnetworkSystemsAnalysisandDesigninaChangingWorld,4thEdition32ObjectivesofIntegrityControlsEnsurethatonlyappropriateandcorrectbusinesstransactionsoccurEnsurethattransactionsarerecordedandprocessedcorrectlyProtectandsafeguardassetsoftheorganizationSoftwareHardwareInformationSystemsAnalysisandDesigninaChangingWorld,4thEdition33PointsofSecurityandIntegrityControlsSystemsAnalysisandDesigninaChangingWorld,4thEdition34InputIntegrityControlsUsedwithallinputmechanismsAdditionallevelofverificationtohelpreduceinputerrorsCommoncontroltechniquesFieldcombinationcontrolsValuelimitcontrolsCompletenesscontrolsDatavalidationcontrolsSystemsAnalysisandDesigninaChangingWorld,4thEdition35DatabaseIntegrityControlsAccesscontrols=managementuserDataencryptionTransactioncontrols=transactionlogUpdatecontrolsBackupandrecoveryprotectionSystemsAnalysisandDesigninaChangingWorld,4thEdition36OutputIntegrityControlsEnsureoutputarrivesatproperdestinationandiscorrect,accurate,complete,andcurrentDestinationcontrols-outputischanneledtocorrectpeopleCompleteness,accuracy,andcorrectnesscontrolsAppropriateinformationpresentinoutputSystemsAnalysisandDesigninaChangingWorld,4thEdition37IntegrityControlstoPreventFraudThreeconditionsarepresentinfraudcasesPersonalpressure,suchasdesiretomaintainextravagantlifestyleRationalizations,including“Iwillrepaythismoney〞or“Ihavethiscoming〞Opportunity,suchasunverifiedcashreceiptsControloffraudrequiresbothmanualproceduresandcomputerintegritycontrolsSystemsAnalysisandDesigninaChangingWorld,4thEdition38FraudRisksandPreventionTechniquesSystemsAnalysisandDesigninaChangingWorld,4thEdition39DesigningSecurityControlsSecuritycontrolsprotectassetsoforganizationfromallthreatsExternalthreatssuchashackers,viruses,worms,andmessageoverloadattacksSecuritycontrolobjectivesMaintainstable,functioningoperatingenvironmentforusersandapplicationsystems(24x7)Protectinformationandtransactionsduringtransmissionoutsideorganization(publiccarriers)SystemsAnalysisandDesigninaChangingWorld,4thEdition40SecurityforAccesstoSystemsUsedtocontrolaccesstoanyresourcemanagedbyoperatingsystemornetworkUsercategoriesUnauthorizeduser–noauthorizationtoaccessRegistereduser–authorizedtoaccesssystemPrivilegeduser–authorizedtoadministratesystemOrganizedsothatallresourcescanbeaccessedwithsameuniqueID/passwordcombinationSystemsAnalysisandDesigninaChangingWorld,4thEdition41UsersandAccessRolesto
ComputerSystemsSystemsAnalysisandDesigninaChangingWorld,4thEdition42ManagingUserAccessMostcommontechniqueisuserID/passwordAuthorization–Isuserpermittedtoaccess?Accesscontrollist–userswithrightstoaccessAuthentication–Isuserwhotheyclaimtobe?Smartcard–computer-readableplasticcardwithembeddedsecurityinformationBiometricdevices–keystrokepatterns,fingerprinting,retinalscans,voicecharacteristicsSystemsAnalysisandDesigninaChangingWorld,4thEdition43DataSecurityDataandfilesthemselvesmustbesecureEncryption–primarysecuritymethodAlteringdatasounauthorizeduserscannotviewDecryptionAlteringencrypteddatabacktoitsoriginalstateSymmetrickey–samekeyencryptsanddecryptsAsymmetrickey–differentkeydecryptsPublickey–publicencrypts;privatedecryptsSystemsAnalysisandDesigninaChangingWorld,4thEdition44SymmetricKeyEncryptionSystemsAnalysisandDesigninaChangingWorld,4thEdition45AsymmetricKeyEncryptionSystemsAnalysisandDesigninaChangingWorld,4thEdition46DigitalSignaturesandCertificatesEncryptionofmessagesenablessecureexchangeofinformationbetweentwoentitieswithappropriatekeysDigitalsignatureencryptsdocumentwithprivatekeytoverifydocumentauthorDigitalcertificateisinstitution’snameandpublickeythatisencryptedandcertifiedbythirdpartyCertifyingauthorityVeriSignorEquifaxSystemsAnalysisandDesigninaChangingWorld,4thEdition47UsingaDigitalCertificateSystemsAnalysisandDesigninaChangingWorld,4thEdition48Secure
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 動(dòng)態(tài)心電圖目前最需要解決的問(wèn)題教學(xué)課件
- 【大學(xué)課件】國(guó)際新興服務(wù)貿(mào)易產(chǎn)業(yè)
- 【物理課件】運(yùn)動(dòng)快慢的描述 速度課件
- DB32T-長(zhǎng)江河道疏浚采砂項(xiàng)目施工質(zhì)量驗(yàn)收規(guī)范編制說(shuō)明
- 信息與通信射頻電路與天線課件
- 《電梯安全經(jīng)驗(yàn)分享》課件
- 現(xiàn)在完成時(shí)復(fù)習(xí)課件
- 單位人力資源管理制度集粹選集十篇
- 固收定期報(bào)告:資金面均衡偏松年末票據(jù)利率上行
- 單位管理制度品讀選集【人力資源管理】
- 2024電力安全工作規(guī)程電力線路部分
- 2024年小學(xué)四年級(jí)科學(xué)考試練習(xí)試卷(試卷版)
- 2024秋七年級(jí)數(shù)學(xué)上冊(cè) 第一章 有理數(shù)1.8 有理數(shù)的乘法 1有理數(shù)的乘法教案(新版)冀教版
- 五年級(jí)科學(xué)上冊(cè)(冀人版)第15課 光的傳播(教學(xué)設(shè)計(jì))
- 科研機(jī)構(gòu)研究員聘用合同
- 廣東省2023-2024學(xué)年五年級(jí)上冊(cè)數(shù)學(xué)期末真題
- 2024小學(xué)四年級(jí)奧數(shù)培優(yōu)競(jìng)賽試卷含答案
- 2024MA 標(biāo)識(shí)體系標(biāo)準(zhǔn)規(guī)范
- 充電樁建設(shè)項(xiàng)目可行性研究報(bào)告
- 溫州食堂承包策劃方案
- 40篇英語(yǔ)短文搞定高考3500個(gè)單詞(全部)
評(píng)論
0/150
提交評(píng)論