IT Diploma (CS) - Match ICT Needs(0df11b236331cb436f789bd094e9e552).pdf
jesusjeager
0 views
33 slides
Oct 15, 2025
Slide 1 of 33
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
About This Presentation
Asset : Login credentials to the financial software system
Threats: phishing emails, vishing calls, credential theft, which are all being used to gain access to financial system details. The attackers impersonate bankers, employees, legitimate individuals, trying to trick staff into giving out sensi...
Asset : Login credentials to the financial software system
Threats: phishing emails, vishing calls, credential theft, which are all being used to gain access to financial system details. The attackers impersonate bankers, employees, legitimate individuals, trying to trick staff into giving out sensitive financial information.
Likelihood: High. Financial departments are a frequent target due to their sensitive information. A data breach is also likely, especially if proper security measures are not in place.
Impact: If financial detalls are compromised the company could suffer from unauthorized transactions, fraud, financial loss and financial penalties for non-compliance with data protection regulations, and damage to the organization's reputation.
Cyber Security Requirements: MFA, employee training on phishing and vishing scams, use email filtering tools which self-reporting, and least privilege models.
Asset: Employee Information
Threats: personal credentials being stolen and used to impersonate company executives, health insurance providers and ete Likelihood: High, HR and finance teams are common targets because of their access to sensitive information.
Impact: if contact details or salary information is exposed, employees could be targeted for identity theft, social engineering scams and further attacks. Breach of health records could cause a privacy legalissue.
Requirements: strong password policies, MFA, role based access controls, employee awareness training.
Asset: Company Information
Threat: Credential stealing malware can infect systems and extract stored passwords, granting attackers unauthorized access.
Likellhood: Medlum - High. many breaches occur due to compromised credentials, specially from unknowingly malware
Impact: could lead to financial fraud, data manipulation, company wide security breaches. financial penalties for non-compliance with data protection regulations, and damage to the organization's reputation
Requirements: password encryption, MFA, threat detection tools, anti-virus, regular password audits and awareness training.
LESSON 3: EVALUATION OF COMPETING AND COMPLEMENTARY INTERNAL AND EXTERNAL ICT SYSTEMS AND PRODUCTS
LESSON 4: CURRENT AND EMERGING SYSTEMS AND PRODUCT TRENDS AND DIRECTIONS
ASSESSMENT
Define the Problem
Agree on Approach
Quantifying Risks
Implementation
Monitoring and Evaluation
Critical Incident Method
Methods of Evaluation
Cloud Computing
Apps
Automation
Big Data Analytics
Artificial Intelligence
Blockchain
Assessment
TOPIC 1 of 16
Actions Plans
Introduction
An ICT implementation project is a project that seeks to install and bring in new ICT
(Information communications technology). This requires an action plan so that
implementation runs smoothly and can be monitored and managed over a longer
period of time.
Define Clear Goals
Defining a goal that is clear as to what the outcome is that needs to be achieved.
Goal descriptions should include the outcome by the client and should describe
details of what the result should look like.
1
List Tasks or Steps
Next is to list out the exact tasks and steps that are required to achieve the goals.
This should be detailed and make sure it includes all steps that would be required.
The detail should be written as if it was written to another person, for ease of
reference and to ensure no information is left out.
2
Assess What is Most Critical and Prioritise
Define the steps and or tasks that are critical and or most important as well as set
priorities within the task’s lists. These are the things that need to be made sure
happen otherwise the project falls apart.
3
Assign and Set Milestones
Assigning the steps to the people who are responsible for those steps or tasks
including assigning self-responsibilities. Setting clear timeframes, deadlines and due
dates for each individual tasks.
4
Monitor and Review
Monitor to ensure that the tasks are being doing to the standard required including
are they achieving the goals or outcomes set out as well as are they being met in
the timeframe/deadlines required. Also, conducting reviews to see if things can be
modified or improved along the way.
5
Summary
Steps to an ICT Implementation Action Plan
Technical problems are common when working in the Information Technology
sector, in fact you could say that is one of the key reasons that IT professionals are
needed! Being aware of simple methods of evaluation and planning approaches to
these technical problems are key to keeping things straight forward and
manageable.
Likewise, strategic objectives are commonplace in an organisation that is continually
growing and progressing. The following topics are key methods and approaches
that will support you in both these areas.
TOPIC 2 of 16
Introduction
Where an issue exists, make sure that you define it correctly before you begin.
Similarly, to giving a diagnosis of a patient before treatment is commenced, you
need to ensure that where a technical problem exists, that a proper understanding is
given to exactly what, where and how the issue has occurred. Likewise, a strategic
objective first needs to come from an area that requires one – such as an area
within the organisation that is not working or where the potential for improvement is
seen – make sure this is clearly defined.
TOPIC 3 of 16
Define the Problem
Agree on the approach that needs to be taken in response to the issue or area of
improvement that is required i.e. What are the steps that need to be taken? What is
the plan of action? Who will be in charge of implementing and monitoring the plan
TOPIC 4 of 16
Agree on Approach
Assess and quantify any risks that may be involved in the agreed-on approach. Do
the potential benefits outweigh the potential risks?
TOPIC 5 of 16
Quantifying Risks
Implement the plan or take the necessary planned actions to now address and do
what is needed. During the planning phase, you would have nominated specific
people that will oversee doing this. Ensure that everyone involved is fully aware of the
details of what is needed.
TOPIC 6 of 16
Implementation
Monitor the plan’s implementation closely by using objective tools such as lists and
data comparison sheets. Check in regularly with people involved in the
implementation and monitoring process and make sure that you oversee all areas. If
a technical problem was what was addressed, check that it is now fixed and back to
working 100%.
TOPIC 7 of 16
Monitoring and Evaluation
Review incidents internal or external that support in similar context and allow a cross
comparison to occur.
TOPIC 8 of 16
Critical Incident Method
TOPIC 9 of 16
Methods of Evaluation
Methods of Evaluation
This is simply the way in which to weigh up options when looking at both internal and
external ICT systems and products. The following are some key methods you can
use:
Cost
Look at the cost of the ICT system or product as well as the workload associated with
operating it.
1
Risks or Potential Issues
Look at the risks or potential issues associated with the ICT system or product. Risks
may be in the way of health, legal, privacy or environmental. Be sure to evaluate all
of these in your comparison.
2
Capability and Performance
What can it do? What does it do? Does it perform well? Reading reviews from people
that have already tried and tested the system or product can support with this part
of the evaluation
3
User Friendly-ness and Integration
It may be amazing at what it can do but is it simple and user friendly? Will it be easy
to implement into the organisation and amongst staff?
4
Summary
Methods of evaluation of competing and complementary internal and external ICT
systems and products
Cloud computing is one of the most current trends currently on the ICT software front.
Cloud computing allows an organisation to keep all of its digital information and
resources in one designated place that can be accessed remotely if required. It is
also regarded for its ability to keep information safe.
TOPIC 10 of 16
Cloud Computing
Apps are a type of software that can be installed and run on a smartphone,
computer, or other electronic devices. Apps have grown enormously in popularity
over the last 10 years. And they have shown themselves to be almost limitless in their
various functions.
TOPIC 11 of 16
Apps
Automation has enabled processes to work faster and has been key in enabling
companies to reach their goals faster and more efficiently.
TOPIC 12 of 16
Automation
Big data analytics is the complex process of examining big data to gather important
information. Big data analytics is being implemented in numerous industries using
manufacturing, supply and large-scale production processes. It is a great method in
processing information more efficiently.
TOPIC 13 of 16
Big Data Analytics
Artificial intelligence refers to a field that combines robust datasets with computer
science to create a problem-solving intelligence. More of an emerging trend,
artificial intelligence is slowly growing and being developed so it can be more easily
implemented.
TOPIC 14 of 16
Artificial Intelligence
Blockchain is a digital database or ledger where digital asset data with encryption
are stored and chained together. Blockchain can be described as data you can only
add to, not take away from or change. Not being able to change the previous blocks
is what makes blockchain so secure. Therefore, blockchain is increasingly being
used for security purposes, and not just in relation to cryptocurrencies.
TOPIC 15 of 16
Blockchain
SUBJECT 1
Analyse and Plan Security Requirements
Module 2
Match ICT Needs with Strategic Direction of the
Organisation
Well Done!
You have now completed the LEARNING for this section.
What's Next?
You can now undertake the ASSESSMENT for this section.
TOPIC 16 of 16
Assessment
Click the RETURN button at the top right of your screen to go
back to your Module Home Page where you will find further
details.