Question
ser Interface and Security Activity Directions: In this assignment, you will develop a user interface for three different functions of an operating system, and decide
ser Interface and Security Activity Directions: In this assignment, you will develop a user interface for three different functions of an operating system, and decide how each of the functions could be secured using various authentication schemes. You must support one single factor, one two-factor, and one multi-factor authentication scheme in your design. You may choose any features in an operating system you want (e.g., login, getting help on a system function, or listing all processes). Your user design will address the following three main security areas: 1. Proposed Security Authentication Scheme 2. Proposed Security Authentication Factor 3. Required Security Policies For example, if you design a single factor login interface, you could develop functional requirements to the level of detail as follows: A user will require a username and password to be entered to access the application. o Clearly outline the authentication scheme and number of factors required. A username must be a mix of alpha-numeric characters and be 810 characters in length. A password must a mix of alpha-numeric characters with a minimum of 1 uppercase, and be 1015 characters in length. o Clearly outline any data input requirements (length, special characters, etc.). The username and password will be encrypted at rest (when stored on the server). The password will never be displayed as it is being typed or transmitted in clear text. o Clearly outline how a secure hack proof design will be achieved. The user will be locked out after three unsuccessful attempts to access the application. The user must rotate their password every 90 days. The user must not reuse their last 10 passwords. The user will not be informed of which authentication factor was invalid. o Clearly outline the security policies that will be supported by your design. Each feature must outline its functional requirements (WHAT needs to be done), but also include a wireframe mockup user interface design and flowchart (HOW this could be done). You should use a tool like draw.io that contains some starter templates to draw your user interface wireframe mockup. Your requirements and design must be detailed enough such that the operating system function is hacker proof and supports strong industry security policies, Deliverables: 1. For each operating system function, provide the following: a. Detailed explanation of your interface design choices and how it addresses the three assignment requirements: authentication scheme, factors, and policies that will be used. b. A table outlining the functional requirements to secure the function in #2a. c. A wireframe mockup user interface that demonstrates how security would be designed for the function in #2a. d. A flowchart that demonstrates the logic of your feature and how security would be designed for the function in #2a.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started