(a) i() What is firewall? (ii) List two methods used in protecting the computer system.
(b) Explain the following stages of the System Development Life Cycle: (i) feasibility study; (ii) design; (iii) maintenance.
(a) (i) A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a private internal network and the public Internet, protecting sensitive data and systems from unauthorized access, hacking attempts, and other security threats.
(ii) Two methods used in protecting computer systems are:
- Antivirus/Antimalware software: Antivirus software is used to detect, prevent, and remove malicious software (malware) such as viruses, worms, and Trojans from infecting a computer system.
- Encryption: Encryption is the process of converting sensitive data into a code to prevent unauthorized access. It helps protect data in transit and at rest.
(b) (i) Feasibility Study: The feasibility study is the first stage of the System Development Life Cycle. It involves evaluating a proposed system to determine whether it is technically, economically, and operationally feasible. This stage helps to identify potential risks and challenges and determine if the proposed system is worth pursuing.
(ii) Design: The design stage involves creating a detailed blueprint of the proposed system, including its architecture, components, and interfaces. This stage also involves defining system requirements and specifications, and determining the methods and technologies to be used in building the system.
(iii) Maintenance: The maintenance stage is the ongoing process of monitoring and updating the system to ensure that it continues to meet its requirements and perform as expected. This may involve fixing bugs and other technical issues, updating software, and making other improvements to the system. It is an important part of the System Development Life Cycle as it helps to maintain the integrity and reliability of the system over time.