Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

ser Interface and Security Activity Directions: In this assignment, you will develop a user interface for three different functions of an operating system, and decide

ser Interface and Security Activity Directions: In this assignment, you will develop a user interface for three different functions of an operating system, and decide how each of the functions could be secured using various authentication schemes. You must support one single factor, one two-factor, and one multi-factor authentication scheme in your design. You may choose any features in an operating system you want (e.g., login, getting help on a system function, or listing all processes). Your user design will address the following three main security areas: 1. Proposed Security Authentication Scheme 2. Proposed Security Authentication Factor 3. Required Security Policies For example, if you design a single factor login interface, you could develop functional requirements to the level of detail as follows: A user will require a username and password to be entered to access the application. o Clearly outline the authentication scheme and number of factors required. A username must be a mix of alpha-numeric characters and be 810 characters in length. A password must a mix of alpha-numeric characters with a minimum of 1 uppercase, and be 1015 characters in length. o Clearly outline any data input requirements (length, special characters, etc.). The username and password will be encrypted at rest (when stored on the server). The password will never be displayed as it is being typed or transmitted in clear text. o Clearly outline how a secure hack proof design will be achieved. The user will be locked out after three unsuccessful attempts to access the application. The user must rotate their password every 90 days. The user must not reuse their last 10 passwords. The user will not be informed of which authentication factor was invalid. o Clearly outline the security policies that will be supported by your design. Each feature must outline its functional requirements (WHAT needs to be done), but also include a wireframe mockup user interface design and flowchart (HOW this could be done). You should use a tool like draw.io that contains some starter templates to draw your user interface wireframe mockup. Your requirements and design must be detailed enough such that the operating system function is hacker proof and supports strong industry security policies, Deliverables: 1. For each operating system function, provide the following: a. Detailed explanation of your interface design choices and how it addresses the three assignment requirements: authentication scheme, factors, and policies that will be used. b. A table outlining the functional requirements to secure the function in #2a. c. A wireframe mockup user interface that demonstrates how security would be designed for the function in #2a. d. A flowchart that demonstrates the logic of your feature and how security would be designed for the function in #2a.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Beginning C# 2005 Databases

Authors: Karli Watson

1st Edition

0470044063, 978-0470044063

More Books

Students also viewed these Databases questions

Question

L01 Differentiate between glia and neurons.

Answered: 1 week ago

Question

b. What groups were most represented? Why do you think this is so?

Answered: 1 week ago