As cyber security is becoming a big concern, and because the application that you will be

developing for the canteen accepts and processes payments, you will need to make provision for
the security of the data that you will be processing. All the controls implemented to secure
applications, should however not impede on the usability of an application.
Q.3.1 Describe any three security controls that you will implement in the application. (6)
Q.3.2 Describe any two ways in which you will ensure the usability of the application. (4)

Q.3.1 Describe any three security controls that you will implement in the application. (6)

1. Encryption: Implementing encryption techniques will ensure that sensitive data such as payment information is protected when it is transmitted and stored. This involves using algorithms to convert the data into an unreadable format that can only be deciphered with the appropriate encryption key.

2. User authentication: Implementing a strong user authentication mechanism will ensure that only authorized individuals can access the application. This can involve the use of passwords, biometrics, or two-factor authentication methods such as SMS verification codes.

3. Regular security updates: Keeping the application up-to-date with the latest security patches and updates will help protect it against new and emerging threats. Regularly reviewing and applying security updates will ensure that any vulnerabilities are addressed promptly.

Q.3.2 Describe any two ways in which you will ensure the usability of the application. (4)

1. User-friendly interface: Designing an intuitive and user-friendly interface will ensure that users can easily navigate and use the application. Clear instructions, visual cues, and logical layout will enhance the usability and reduce the learning curve for users.

2. Performance optimization: Ensuring that the application performs efficiently and quickly will enhance its usability. This includes optimizing code, minimizing load times, and optimizing database queries to ensure that users can complete their tasks without any delays or interruptions. Regular monitoring and performance testing can help identify and resolve any bottlenecks.