Examine how system balanced security and usability

Assignment Help Computer Network Security
Reference no: EM13769944

A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register. The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart.

After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive.

Write a five to eight (5-8) page paper in which you:

Analyze the new system and determine the design issues with this new system.

Describe how you would correct the design issues with the system to make the restaurant managers happy.

Create a design plan that:

Lists and explains the tasks associated with improving this interface.

Contains at least six (6) tasks.

Includes realistic time estimates for each task to be completed.

Analyzes the development of the system in your plan.

Analyzes the testing of the system in your plan.

Analyzes the implementation of the system in your plan.

Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

Suggest changes that could be made to the security of this system to still meet security objectives but make the system more usable.

Use Microsoft Visio or an open source alternative, Dia, to create a graphical representation of your proposed interface. Note: The graphically depicted solution is not included in the required page length.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13769944

Questions Cloud

How has the ada been changed by the ada amendments act : How has the ADA been changed by the ADA Amendments Act of 2008? Did Congress get it right this time? Will the new law be more effective at protecting employees with disabilities
Identify an appropriate sampling frame for each : Identify an appropriate sampling frame for each of the following populations. If there is no appropriate sampling frame, explain why. Students at a particular college or university b. adults living in the state of Maryland households in Annapolis, Ma..
What are some arguments in favor of affirmative action : What are some arguments in favor of affirmative action? Against it? What is your current view of affirmative action? Why? Does your view differ depending on the measures used to achieve affirmative action goals
Air pollution particles atmosphere : In this unit, you learn how air pollution particles move through the atmosphere. The movement of air pollution across states, countries, and the globe creates some interesting policy issues. For example, states have sued power plants in other stat..
Examine how system balanced security and usability : Analyzes the implementation of the system in your plan. Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.
What should be done regarding applicants : Would you advise an employer that operates retail clothing stores to drug test? If so, under what circumstances? Using what procedures? What should be done regarding applicants or employees who test positive
Would it tend to result in adverse impact : Suppose that an employer has a close working relationship with your college and primarily recruits from there for professional positions. What would be the consequence of that recruiting strategy? Would it tend to result in adverse impact
Negative impact of energy resource on the environment : Does the use of these types of energy resource have a negative impact on the environment in your area?
Who take legal action against their employers : Do you think that most employees who take legal action against their employers have valid claims or are looking to "get something for nothing?" What is the basis for your opinion

Reviews

Write a Review

Computer Network Security Questions & Answers

  What ethical issues surround using honeypot to trick attacks

Although honeypots are common, some security professionals believe they should not be used because they encourage attackers. What do you think?

  Write the enterprise technical infrastructure security plan

Write one page with references in APA format.Utilizing your comprehensive security plan outline as a guide (It is the attached document), write the enterprise technical infrastructure security plan for the organization.

  Is protocol secure for sharing secrets on server computer

Suppose that Alice shares secret with her company's server computer. When Alice is on trip, she tries to store important message in CEO's account directory. Is this protocol secure? If not, how do you feel it could be modified to make it so?

  Computer ethics

CHECK OUT COMPUTER ETHICS INSTITUTE'S ADVICE. The Computer Ethics Institutes Web site at www.cpsr.org/program/ethics/cei.html offers the "Ten Commandments of Computer Ethics" to guide you in the general direction of ethical computer use.

  Thoughts regarding vulnerabilities surrounding computing

What are your thoughts regarding vulnerabilities surrounding the computing world today and the risks of computers being attacked.

  Write down a class code that outputs a security code the

question 1 write a class called message that prompts the user to enter a message of three words as one string where

  How system with capabilities as its access control mechanism

In general, do capabilities offer more or less protection against Trojan horses than do access control lists? Justify your answer in light of the theoretical equivalence of ACLs and C-Lists.

  Application you are a network administrator in net ambit

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  Prepare a trouble ticket to record the problem

Prepare a Trouble Ticket to record the problem

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

  Analyze issue using social contract and rule utilitarianism

Analyze issue using Social Contract, Kantianism, Act Utilitarianism, Social Contract Theory, Virtual Ethics and Rule Utilitarianism.

  Define cybersecurity as an organizational strategy

Prepare a short paper of approximately 8-12 ( double spaced)pages investigating the strategic impact of cybersecurity in the organization with a special focus on its ethical and legal implications.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd