logo

THE USABILITY EVALUATION

   

Added on  2022-08-29

10 Pages2176 Words27 Views
Running head: USABILITY EVALUATION
USABILITY EVALUATION
Name of the Student
Name of the University
Author Note

USABILITY EVALUATION1
Introduction
The aim of this report is to design a usability guideline that will be suitable for
developing a website. The paper aims at offering better understanding towards the interface
design and usability principles that are associated with software. The different types of user
interfaces that are used within software will be discussed within this report. For the purpose of
developing the evaluation report the selected area is cyber security. Cyber security is a wide
topic that is used for the purpose of offering better support towards the users. The software tool
that is selected for evaluation is Wireshark.
About Wireshark
Wireshark is a cyber-security application tool that is used for the purpose of assessing the
vulnerability that arises within a network. With the help of this application it is expected that
proper security can be maintained over the network. Wireshark is a network packet analyzer that
is used for the purposes of managing the data packets efficiently. This is available for free and is
open source software. The Key features that are offered with the use of wireshark application are
that it is available for units as well as for the windows (Bullock and Parker 2017). This helps in
importing the package from text files efficiently. Cyber security is one of the major components
so it is important to use appropriate tool that will be capable of reducing the errors that are faced
within the network. With the use of proper cyber security application it becomes easy to manage
the overall data. Wireshark is network monitoring and analyzing tool that is used for the purpose
of checking different types of traffic going through the network (Iqbal and Naaz 2019). This
ensures that each packet is managed and analyzed efficiently and the system is capable of

USABILITY EVALUATION2
reading all OSI layers separately hence making troubleshooting very effective. With the help of
Wireshark it becomes easy to trace, troubleshoot, analyze, and view a particular packet format.
However sometimes it has been observed the wireshark is used by hackers for hacking purpose.
Thus it can be stated that with the use of this application proper security can be offered towards a
network.
Interactive system and its users
The interactive system of Wireshark is designed for the purpose of providing better
support towards the troubleshoot network problems. This is also used for the purpose of
examining the sceurity problems that are faced within the network. It can be stated that with the
use of Wireshark, it becomes easy to protect the cyber sites from possible threats. In addition to
this the application Wireshark is also used for the purpose of verifying the network applications
effectively (Brokaw, Eckel and Brewer 2015). Wireshark offers a better platform towards the
developers for the purpose of debugging the protocol implementations. The users of the
application are network administrator, QA engineers, developers, normal users, and network
security engineers.
User interface design guidelines
User interface design guidelines are used for the purpose of determining whether the
interface is suitable for the users to access or not (Gorski and Iacono 2016). With the help of user
interface design it becomes easy to anticipate what the users might need to for interacting with an
interface (Paz and Pow-Sang 2016). Basic guidelines based on which the user interface design
easy will you date are listed below:

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Analysis Using Wireshark for Networked Application Management
|36
|2887
|458

Network Analysis Using Wireshark
|20
|2983
|459

IT Wireless: WLAN Tools, Packet Capture, and Wireless Technologies
|16
|2601
|65

Wireless Technologies: Wireshark, Cain and Abel
|25
|3468
|2

Interface That Tracks Energy Usage at the Home : Presentation :
|13
|541
|16

Network Analysis using Wireshark
|18
|2751
|119