Security

Description

Case Study 3: Security

Due Week 7 and worth 100 points

A large, fast-food chain unveiled a new touch screen register for its franchises.

Each cashier was assigned a user id and password combination to log in to the

register. The system allowed the incorrect password to be entered four (4) times

before the register would lock and require a manager to unlock it with a key card.

To prevent unauthorized access, the registers would lock after three (3) minutes

if the screen was not touched. When the register locked, only the cashier who

was logged in prior to it locking could unlock it without a system restart.

After a few days in operation, restaurant managers started complaining about the

amount of time they were spending unlocking the registers. Some cashiers were

forgetting their user Id and password, so other cashiers would log in for them. It

also seemed that the button layout made it easy for the cashiers to key in the

incorrect password. The managers also complained that cashiers would leave for

a break or end their shift and forget to log out of the locked register. The

managers would have to reboot the system, a three to five (3-5) minute process

in order for the next cashier to log in. Additionally, managers noticed that grease

was building up on the touch screens, making them less responsive.

 

Write a five to eight (5-8) page paper in which you:

1. Analyze the new system and determine the design issues

with this new system.

2. Describe how you would correct the design issues with the

system to make the restaurant managers happy.

3. Create a design plan that:

1. Lists and explains the tasks associated with improving this

interface.

2. Contains at least six (6) tasks.

3. Includes realistic time estimates for each task to be

completed.

4. Analyzes the development of the system in your plan.

5. Analyzes the testing of the system in your plan.

6. Analyzes the implementation of the system in your plan.

4. Examine how this system balanced security and usability,

and explain the challenges of incorporating system security

and system usability into a design.

5. Suggest changes that could be made to the security of this

system to still meet security objectives but make the system

more usable.

6. Use Microsoft Visio or an open source alternative, Dia, to

create a graphical representation of your proposed interface.

Note: The graphically depicted solution is not included in the

required page length.

7. Use at least three (3) quality resources in this assignment.

Note: Wikipedia and similar Websites do not qualify as

quality resources.

Your assignment must follow these formatting requirements:

 Be typed, double spaced, using Times New Roman font

(size 12), with one-inch margins on all sides; citations and

references must follow APA or school-specific format. Check

with your professor for any additional instructions.

 Include a cover page containing the title of the assignment,

the student’s name, the professor’s name, the course title,

and the date. The cover page and the reference page are

not included in the required assignment page length.

 Include charts or diagrams created in Excel, Visio, MS

Project, or one of their equivalents such as Open Project,

Dia, and OpenOffice. The completed diagrams/charts must

be imported into the Word document before the paper is

submitted.

 Absolutely no plagiarism, will be thoroughly checked.

 Questions should be used as a header and then followed by

its researched answer.

 All questions must be answered and all format criteria must

followed.

Calculate the price of your order

Simple Order Process

Fill in the Order Form

Share all the assignment information. Including the instructions, provided reading materials, grading rubric, number of pages, the required formatting, deadline, and your academic level. Provide any information and announcements shared by the professor. Choose your preferred writer if you have one.

Get Your Order Assigned

Once we receive your order form, we will select the best writer from our pool of experts to fit your assignment.

Share More Data if Needed

You will receive a confirmation email when a writer has been assigned your task. The writer may contact you if they need any additional information or clarifications regarding your task

Let Our Essay Writer Do Their Job

Once you entrust us with your academic task, our skilled writers embark on creating your paper entirely from the ground up. Through rigorous research and unwavering commitment to your guidelines, our experts meticulously craft every aspect of your paper. Our process ensures that your essay is not only original but also aligned with your specific requirements, making certain that the final piece surpasses your expectations.

Quality Checks and Proofreading

Upon the completion of your paper, it undergoes a meticulous review by our dedicated Quality and Proofreading department. This crucial step ensures not only the originality of the content but also its alignment with the highest academic standards. Our seasoned experts conduct thorough checks, meticulously examining every facet of your paper, including grammar, structure, coherence, and proper citation. This comprehensive review process guarantees that the final product you receive not only meets our stringent quality benchmarks but also reflects your dedication to academic excellence.

Review and Download the Final Draft

If you find that any part of the paper does not meet the initial instructions, send it back to us with your feedback, and we will make the necessary adjustments.