Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Computer User Interface, Essay Example

Pages: 1

Words: 354

Essay

Introduction

This report provides a brief introduction to the elements contained within a User Interface (UI) design to provide tracking data on the potential of terrorist threat.  This covers both screed design concepts and a list of requirements for the capture of suspect terrorist data.

Ui design elements

The following elements would be considered vital to the UI design concept

  • Data encryption for security purposes; includes firewalls, password protection and other security protocols
  • Links to important database feeds i.e. FBI and Police Criminal Records data
  • Links to intelligence data ( security services) via highly secured channels
  • Security Profile and data access permissions for all users of the system
  • Audit logs showing all data access and movements on the system by user id and IP address.(National Surveillance Agency, 2011)

User interface screen design

The following illustrates some of the expected fields on the screen design

  • Menus
  • Data Entry Screens
  • Context Sensitive Help
  • Site Map
  • Drop down Menus
  • Sort Facility by data types
  • Search Facility
  • Standard Report Menu
  • Secure Links

User interface requirements

This list provides UI requirements in order to ensure the screen design is understood for capture of internet suspect data. (Federal Bureau of Investigation, 2011)

  • Database links to FBI and Police Criminal Records Files
    • Terrorist suspects information file
    • Photo Gallery
    • Forensic Evidence / Information
    • Known Associates / Terrorist affiliations
    • Latest whereabouts
    • Geographical disposition
  • Security
    • Access security clearance to information
    • Date file accessed | user id access record
    • Confidentiality levels | legal requirements
    • Authorization levels

Conclusion

Dealing with Terrorist data includes vital information sharing links with such agencies as the FBI, CIA, Homeland Security, Police Records etc.  This would involve the highest level of security protocols to be applied to data access.  Essentially an agreed collaboration of information / data sharing.  International data could be shared via the FBI with external agencies like INTERPOL.  Potential links to Defence Data would also need to be co-ordinated through the appropriate Government agencies. (Bussewitz, C. 2011)

Software of this nature needs to undergo a high degree of resilience testing to prevent potential hacking and system intrusion.

Works Cited

Bussewitz, C. (2011). Sharing Terrorist Data with local police. Retrieved 8 24, 2011, from Fronline: http://www.pbs.org/wgbh/pages/frontline/enemywithin/reality/flowchart.html

Federal Bureau of Investigation. (2011). FBI Terrorist Database. Retrieved 8 24, 2011, from Feneral Bureau of Investigation: http://www.fbi.gov/news/testimony/the-terrorist-screening-database-and-watchlisting-process

National Surveillance Agency. (2011). National Surveillance Agency. Retrieved 8 24, 2011, from National Surveillance Agency: http://www.nsatt.org/

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Samples, Power Analysis, and Design Sensitivity Samples, Power Analysis, and Design Sensitivity, Essay Example

Compare and contrast internal and external validity. Describe and give examples of research questions for which external validity is a primary concern. Describe and give [...]

Pages: 5

Words: 1457

Essay

Business Responses, Essay Example

Idealized Attributes From the average above, I found out that the leader sometimes posses idealized attribute’s form of transformational leadership. This means that followers do [...]

Pages: 2

Words: 460

Essay

Types of Power, Essay Example

The videos taught me that there is not only one type of power but five types of powers which are referent power, reward power, legitimate [...]

Pages: 2

Words: 602

Essay

Criminal Justice: Juveniles, Essay Example

Juveniles are treated differently as compared to adult criminals. This is because most juveniles engage in petty cases and are not fully matured as to [...]

Pages: 3

Words: 769

Essay

Harris/Jardines Questions, Essay Example

Part One The issue of law considered by Kagan in this case is whether or not a drug detection dog’s alert during a traffic stop [...]

Pages: 3

Words: 772

Essay

Management Week 1 Assignment 3, Essay Example

We would like to own a Bed and Breakfast in the hill country outside of Austin, overlooking the beautiful Lake Austin.  It would be a [...]

Pages: 2

Words: 485

Essay

Samples, Power Analysis, and Design Sensitivity Samples, Power Analysis, and Design Sensitivity, Essay Example

Compare and contrast internal and external validity. Describe and give examples of research questions for which external validity is a primary concern. Describe and give [...]

Pages: 5

Words: 1457

Essay

Business Responses, Essay Example

Idealized Attributes From the average above, I found out that the leader sometimes posses idealized attribute’s form of transformational leadership. This means that followers do [...]

Pages: 2

Words: 460

Essay

Types of Power, Essay Example

The videos taught me that there is not only one type of power but five types of powers which are referent power, reward power, legitimate [...]

Pages: 2

Words: 602

Essay

Criminal Justice: Juveniles, Essay Example

Juveniles are treated differently as compared to adult criminals. This is because most juveniles engage in petty cases and are not fully matured as to [...]

Pages: 3

Words: 769

Essay

Harris/Jardines Questions, Essay Example

Part One The issue of law considered by Kagan in this case is whether or not a drug detection dog’s alert during a traffic stop [...]

Pages: 3

Words: 772

Essay

Management Week 1 Assignment 3, Essay Example

We would like to own a Bed and Breakfast in the hill country outside of Austin, overlooking the beautiful Lake Austin.  It would be a [...]

Pages: 2

Words: 485

Essay

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!