Foundation for Systems Design

What is Systems Design

\text{Analysis (Analysis Models and Documents)} \to \text{Design (Design Models and Documents)} \to \text{Implementation}

Design Models

Design is a model-building activity.

Remember: Jumping to programming without design often causes less than optimum solution and may require rework.

Analysis Models \to Design Models

Requirements Models:

Design Models:

Design Activities

Design Activities:

More on Application Components: Issues packaging components

More on Application Components: Typical models for designing application components

More on UI: Typical models for designing UI

More on Database: Relational Database Management Systems (RDBMS)

More on Database: Example — Typical Table Definition as Part of Database Scheme

FieldTypeCollationAttributedNullDefaultExtra
productItemvarchar(15)latin1_swedith_ciNoNone
inventoryItemmediumint(9)NoNone
sizevarchar(8)latin1_swedith_ciNoNone
colorvarchar(10)latin1_swedith_ciNoNone
optionsvarchar(12)latin1_swedith_ciNoNone
quantityOnHandmediumint(9)NoNone
averageCostdecimal(8,2)NoNone
reorderQuantitymediumint(9)NoNone
dateLastOrderdateNoNone
dateLastShipmentdateNoNone

System Controls and Security

Integrity Controls: Maintain integrity inf inputs, outputs, and data and programs.

Security Controls: Protect the assets form threats, internal and external.

Input Controls

Prevent invalid or erroneous data from entering the system.

Value Limit Controls: Check the range of inputs for reasonableness

Completeness Controls: Ensure all the data has been entered

Data Validation Controls: Ensure that specific data values are correct

Field Combination Controls: Ensure data is correct based on relationships between fields.

Output Controls

Important for ensuring that output arrives at proper destination and is accurate, current, and complete.

Examples:

Redundancy, Backup, and Recovery

Goal: Protect data and systems from catastrophes.

Designing Security Controls

Goal: Protect all assets against external threats.

Types of Users

Access Controls: Limit a person’s ability to access servers, files, data, and applications.

Registered Users: Those with authorization.

Unauthorized Users: Anyone not registered

Privileged Users: Those that maintain lists and systems.

Data Encryption

Encryption: Alter data to make it unrecognizable.

Decryption: Convert encrypted data back to readable format.

Encryption Algorithm: Mathematical transformation of the data.

Encryption Key: Lone data string that allows the same algorithm to produce unique encryptions.

Symmetric v.s. Asymmetric Key Encryption

Symmetric: Uses same key to encrypt and decrypt

Asymmetric: Uses different keys to encrypt and decrypt.

Secure Transactions

Secure Sockets Layer (SSL): Standard set of protocols for authentication and authorization

Transport Layer Security (TLS): Internet standard equivalent to SSL.

IP Security (IPSec): Internet security protocol at a low-level transmission.

Hypertext Transfer Protocol Secure (HTTPS): Internet standard to transmit Web pages.