Computer Security Analysis

Read Complete Research Material



Computer Security Analysis

Computer Security Analysis

The computer systems analysts is often misunderstood because they speak a techno-language that sounds more Greek than Greek, with common words like Sat, FoxPro, VB-4, C++ Himmelberg (8G), often leaving non-analysts scratching their heads. However, the development of efficient software and hardware systems is an increasingly essential and vital function to business operations and success. Despite the usually unknown methods and skills of the computer systems analyst, they are not a solitary player in the organization but rather an integrated member of a team. In their efforts to design effective computer systems whose hardware and software enables the organization to operate smoothly and competitively, the analyst must often work with all persons involved in the flow of information within the company. They deal with programmers, clients, managers and others to develop and implement different software to enable the company to take maximum advantage of managing information and achieving competitive advantage with technology.

The typical systems development life cycle is as follows:

1) Initiation,

2) Project Planning,

3) Analysis,

4) Logical Design,

5) Physical Design,

6) Implement,

7) Maintain

The systems analysts must understand that information systems are a combination of process and data. There are key differences between process orientation and data orientation but most system needs have a combination of elements of the two or use both orientations to a degree. The main distinctions between a process-oriented system and a data oriented system are listed in the table below:

Process Orientation Data Orientation

Focuses on what the system is supposed to do Data the system needs to operate Data files are designed for each individual application Data needs do not change as Rapidly as processed Much controlled duplication Data files designed for enterprise Limited, controlled duplication (What 5) Throughout the public and private sectors, computer systems are ...
Related Ads