IT Diploma (CS) - Match ICT Needs(0df11b236331cb436f789bd094e9e552).pdf

jesusjeager 0 views 33 slides Oct 15, 2025
Slide 1
Slide 1 of 33
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33

About This Presentation

Asset : Login credentials to the financial software system
Threats: phishing emails, vishing calls, credential theft, which are all being used to gain access to financial system details. The attackers impersonate bankers, employees, legitimate individuals, trying to trick staff into giving out sensi...


Slide Content

Diploma of Information Technology
SUBJECT 1: Analyse and Plan Security Requirements
Module 2: Match ICT Needs with Strategic Direction of the Organisation
Copyright
All material in this document or within this section of published material on the Equinim Hub is copyright ©
Equinim College 2024 except as outlined below, and may not, in whole or in part, and in any form or by any
means (electronic, mechanical, micro copying, photocopying, recording or otherwise) be reproduced, stored in
a retrieval system, published, transmitted or altered in any manner without prior written permission of the
copyright owner. 
Version #01-20240111
LESSON 1: KEY SECTIONS OF AN ACTION PLAN FOR ICT IMPLEMENTATION PROJECTS
LESSON 2: EVALUATION AND PLANNING APPROACHES
Actions Plans
Introduction
IT DIPLOMA (CS) 1.2 - Match ICT Needs with
Strategic Direction of the Organisation

LESSON 3: EVALUATION OF COMPETING AND COMPLEMENTARY INTERNAL AND EXTERNAL ICT SYSTEMS AND PRODUCTS
LESSON 4: CURRENT AND EMERGING SYSTEMS AND PRODUCT TRENDS AND DIRECTIONS
ASSESSMENT
Define the Problem
Agree on Approach
Quantifying Risks
Implementation
Monitoring and Evaluation
Critical Incident Method
Methods of Evaluation
Cloud Computing
Apps
Automation
Big Data Analytics
Artificial Intelligence
Blockchain
Assessment

TOPIC 1 of 16
Actions Plans

Introduction
An ICT implementation project is a project that seeks to install and bring in new ICT
(Information communications technology). This requires an action plan so that
implementation runs smoothly and can be monitored and managed over a longer
period of time. 

Define Clear Goals
Defining a goal that is clear as to what the outcome is that needs to be achieved.
Goal descriptions should include the outcome by the client and should describe
details of what the result should look like.
1

List Tasks or Steps
Next is to list out the exact tasks and steps that are required to achieve the goals.
This should be detailed and make sure it includes all steps that would be required.
The detail should be written as if it was written to another person, for ease of
reference and to ensure no information is left out. 
2

Assess What is Most Critical and Prioritise
Define the steps and or tasks that are critical and or most important as well as set
priorities within the task’s lists. These are the things that need to be made sure
happen otherwise the project falls apart.
3

Assign and Set Milestones
Assigning the steps to the people who are responsible for those steps or tasks
including assigning self-responsibilities. Setting clear timeframes, deadlines and due
dates for each individual tasks.
4

Monitor and Review
Monitor to ensure that the tasks are being doing to the standard required including
are they achieving the goals or outcomes set out as well as are they being met in
the timeframe/deadlines required. Also, conducting reviews to see if things can be
modified or improved along the way.
5

Summary
Steps to an ICT Implementation Action Plan

Technical problems are common when working in the Information Technology
sector, in fact you could say that is one of the key reasons that IT professionals are
needed! Being aware of simple methods of evaluation and planning approaches to
these technical problems are key to keeping things straight forward and
manageable. 
Likewise, strategic objectives are commonplace in an organisation that is continually
growing and progressing. The following topics are key methods and approaches
that will support you in both these areas.
TOPIC 2 of 16
Introduction

Where an issue exists, make sure that you define it correctly before you begin.
Similarly, to giving a diagnosis of a patient before treatment is commenced, you
need to ensure that where a technical problem exists, that a proper understanding is
given to exactly what, where and how the issue has occurred. Likewise, a strategic
objective first needs to come from an area that requires one – such as an area
within the organisation that is not working or where the potential for improvement is
seen – make sure this is clearly defined. 
TOPIC 3 of 16
Define the Problem

Agree on the approach that needs to be taken in response to the issue or area of
improvement that is required i.e. What are the steps that need to be taken? What is
the plan of action? Who will be in charge of implementing and monitoring the plan
TOPIC 4 of 16
Agree on Approach

Assess and quantify any risks that may be involved in the agreed-on approach. Do
the potential benefits outweigh the potential risks? 
TOPIC 5 of 16
Quantifying Risks

Implement the plan or take the necessary planned actions to now address and do
what is needed. During the planning phase, you would have nominated specific
people that will oversee doing this. Ensure that everyone involved is fully aware of the
details of what is needed.
TOPIC 6 of 16
Implementation

Monitor the plan’s implementation closely by using objective tools such as lists and
data comparison sheets. Check in regularly with people involved in the
implementation and monitoring process and make sure that you oversee all areas. If
a technical problem was what was addressed, check that it is now fixed and back to
working 100%. 
TOPIC 7 of 16
Monitoring and Evaluation

Review incidents internal or external that support in similar context and allow a cross
comparison to occur.
TOPIC 8 of 16
Critical Incident Method

TOPIC 9 of 16
Methods of Evaluation

Methods of Evaluation
This is simply the way in which to weigh up options when looking at both internal and
external ICT systems and products. The following are some key methods you can
use: 

Cost
Look at the cost of the ICT system or product as well as the workload associated with
operating it.
1

Risks or Potential Issues
Look at the risks or potential issues associated with the ICT system or product. Risks
may be in the way of health, legal, privacy or environmental. Be sure to evaluate all
of these in your comparison.
2

Capability and Performance
What can it do? What does it do? Does it perform well? Reading reviews from people
that have already tried and tested the system or product can support with this part
of the evaluation
3

User Friendly-ness and Integration
It may be amazing at what it can do but is it simple and user friendly? Will it be easy
to implement into the organisation and amongst staff?
4

Summary
Methods of evaluation of competing and complementary internal and external ICT
systems and products

Cloud computing is one of the most current trends currently on the ICT software front.
Cloud computing allows an organisation to keep all of its digital information and
resources in one designated place that can be accessed remotely if required. It is
also regarded for its ability to keep information safe. 
TOPIC 10 of 16
Cloud Computing

Apps are a type of software that can be installed and run on a smartphone,
computer, or other electronic devices. Apps have grown enormously in popularity
over the last 10 years. And they have shown themselves to be almost limitless in their
various functions. 
TOPIC 11 of 16
Apps

Automation has enabled processes to work faster and has been key in enabling
companies to reach their goals faster and more efficiently.
TOPIC 12 of 16
Automation

Big data analytics is the complex process of examining big data to gather important
information. Big data analytics is being implemented in numerous industries using
manufacturing, supply and large-scale production processes. It is a great method in
processing information more efficiently. 
TOPIC 13 of 16
Big Data Analytics

Artificial intelligence refers to a field that combines robust datasets with computer
science to create a problem-solving intelligence. More of an emerging trend,
artificial intelligence is slowly growing and being developed so it can be more easily
implemented. 
TOPIC 14 of 16
Artificial Intelligence

Blockchain is a digital database or ledger where digital asset data with encryption
are stored and chained together. Blockchain can be described as data you can only
add to, not take away from or change. Not being able to change the previous blocks
is what makes blockchain so secure. Therefore, blockchain is increasingly being
used for security purposes, and not just in relation to cryptocurrencies. 
TOPIC 15 of 16
Blockchain

SUBJECT 1
Analyse and Plan Security Requirements
Module 2
Match ICT Needs with Strategic Direction of the
Organisation
Well Done!
You have now completed the LEARNING for this section.
What's Next?
You can now undertake the ASSESSMENT for this section.
TOPIC 16 of 16
Assessment

Click the RETURN button at the top right of your screen to go
back to your Module Home Page where you will find further
details.
Tags