- Role Of System Analyst :-The Systems Analyst is an “IT Business Analyst” who is more focused on system design and the technical aspects of the solution. The systems analyst’s role is mostly system solution centric (does not generally participate in the requirements gathering process) and is involved in the creation of functional and technical specifications. This is the professional who, once requirements are clearly defined, creates the functional solution and, by working with the technical team (architect and developers), creates technical specifications and designs.
Other common titles for this role are: Systems Engineer, Business Analyst (generic term), etc.
- Quality Control :-1. Quality Control is concerned with the software product being developed. It measures and controls the quality of the software as it is being developed.
2. Quality control system provides routine checks to ensure that the software is being developed correctly without errors.
3. The Quality Control system identifies and addresses product errors/defects.
4. Quality Control ensures that the final product is error free and satisfactory.
5. Quality Control (QC) can also be referred as testing activity.
- Main Importance of feasibility study in Software Development :- The aim of a feasibility study is to see whether it is possible to develop a system at a reasonable cost. At the end of the feasibility study a decision is taken whether to proceed or not. A feasibility study contains the general requirements of the proposed system.
Let us consider the task of setting up an Information System for a nursery and seeing how Information Technology can help it run more efficiently.
- Audit Trail:- An audit trail is a logical record of computer activities/usage/processing pertaining to an operatingor application system or user activities. An information system may have several audit trails, eachdevoted to a particular type of activity. All these audit trails are primarily extracted from the auditlog recorded on chronological basis. The audit log is maintained only for the list of activitiesspecified for which the log is to be maintained. The information can be recorded varies includingbut not limited to1. Time stamp for the log in/out time2. Terminal in use3. Files accessed4. Transactions performed5. Amendments madeAudit trails can provide a means to help accomplish several security-related objectives, includingindividual accountability, reconstruction of events (actions that happen on a computer system),intrusion detection, and problem analysis, as well as evidence of the correct processing regimes
- Various Types of threats in computer system:- 1. Trojan. Trojan is one of the most complicated threats among all. Most of the popular banking threats come from the Trojan family such as Zeus and SpyEye. It has the ability to hide itself from antivirus detection and steal important banking data to compromise your bank account. If the Trojan is really powerful, it can take over your entire security system as well. As a result, a Trojan can cause many types of damage starting from your own computer to your online account. 2. Virus. Looking at the technology 10 years back, Virus is something really popular. It is a malicious program where it replicates itself and aim to only destroy a computer. The ultimate goal of a virus is to ensure that the victim’s computer will never be able to operate properly or even at all. It is not so popular today because Malware today is designed to earn money over destruction. As a result, Virus is only available for people who want to use it for some sort of revenge purpose.
3. Worms. One of the most harmless threats where it is program designed only to spread. It does not alter your system to cause you to have a nightmare with your computer, but it can spread from one computer to another computer within a network or even the internet. The computer security risk here is, it will use up your computer hard disk space due to the replication and took up most of your bandwidth due to the spread.
4. Spyware. Is a Malware which is designed to spy on the victim’s computer. If you are infected with it, probably your daily activity or certain activity will be spied by the spyware and it will find itself a way to contact the host of this malware. Mostly, the use of this spyware is to know what your daily activity is so that the attacker can make use of your information. Such as if you browse on sex toys for a week every day, the attacker will try to come out with a sex toy scam to cheat on your money.
5. Scareware. Scareware is something that plant into your system and immediately inform you that you have hundreds of infections which you don’t have. The idea here is to trick you into purchasing a bogus anti-malware where it claims to remove those threats. It is all about cheating your money but the approach is a little different here because it scares you so that you will buy.
6. Keylogger. Something that keeps a record of every keystroke you made on your keyboard. Keylogger is a very powerful threat to steal people’s login credential such as username and password. It is also usually a sub-function of a powerful Trojan.
7. Adware. Is a form of threat where your computer will start popping out a lot of advertisement. It can be from non-adult materials to adult materials because any ads will make the host some money. It is not really harmful threat but can be pretty annoying.