Sunday, April 28, 2019

Integrating Security and Usability into the Requirements and Design Research Paper

Integrating Security and Usability into the Requirements and Design Process - Research Paper ExampleThe user interface design of the touch screen register has features that enable it to attain security. First, the new dodging enforces vex controls by requiring that every cashier supplies a matching pair of user-id and password in order to enter in to the register. It is not only helpful in preventing non-legitimate devil to the register, but to a fault provides a skilful avenue to introduce role-based authentication. Moreover, it result be possible associating a given cashier with a received workstation, and in certain(a) instances, it is possible associating a cashier with a certain workgroup. Second, the registers ability to spiral after(prenominal) four unsuccessful login attempts is a good strategy to suppress the efforts of brute force attackers and malicious insiders who will constantly use trial and error in a bid to gain unauthorized access to the system. Further, the safety of information stored therein is enhanced by the condition that only the managers can use a keycard to unlock the register following unsuccessful login attempts. Finally, unauthorized access is also prevented by the registers ability to lock if the screen does not get touched for a period of three minutes.The system also features certain security utilities that to some extent collide with the usability. First, the restriction that only the cashier who was authenticated before the system locked will be in a position to unlock it is a feature that prevents the idea of separate end-users performing malicious acts on other peoples account profile. Otherwise, new cashiers would need to restart the system. The tool also increases accountability whilst enhancing the systems intention to associate every action with a particular user (Wysocki, 2013).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.