Running head: Input Controls
Dr. James Francisco
Systems Analysis and Development
February 12, 2012
A company must do everything in its power to protect its data. This includes not only the firm’s own information, but that of its customers, employees, and suppliers. In this paper I will be describing four types of input controls, in user interface design, and their primary functions. Input control includes the necessary measures to ensure that input data is correct, complete and secure (Rosenblatt & Shelly, 2012). Some examples of input controls are audit trails, encryption, password security, and data security, just to name a few. ...view middle of the document...
4. Intrusion Detection: This is process that detects any unauthorized use. Audit trails can help in intrusion detection if they record appropriate events (Gopalakrishna, 2000). Determining what events to audit so that audit trails can be used in an effective manner to aid intrusion detection is one of the present research issues being looked into by the research community (Gopalakrishna, 2000).
Encryption is the most popular and the most effective type of input control. Sensitive data can be encrypted, or coded, in a process called encryption, so only users with decoding software can read it (Rosenblatt & Shelly, 2012). The two main types of encryption are asymmetric encryption and symmetric encryption. Asymmetric encryption uses two keys that are mathematically related and are known as the public key (known to everyone and can be freely distributed) and the private key (known only to the recipient of the message) (Ciampa, 2009). Symmetric encryption, also known as private key encryption, uses the same key to decrypt and encrypt messages.
An important feature of security, today, is a secure password. A password is a secret combination of letters and numbers that serves to authenticate (validate) a user by what he knows (Ciampa, 2009). A password must also be of a sufficient length and complexity so that an attacker cannot easily guess the password (Ciampa, 2009).
Another input control is data security. Data security policies and procedures protect data from loss or damage, which is a vital goal in every organization (Rosenblatt & Shelly, 2012). Also data security ensures...