ACT Document - 2023

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

ACT Road Map

BITMAP300
Workshop 1

Australian School of Accounting


TEQSA Provider PRV14313 | CRICOS 03847F
Level 9, 140 Elizabeth Street NSW 2000
Phone: 1300 672 076 | info@asahe.edu.au | www.asahe.edu.au
• Identify two key management responsibilities in
implementing successful information systems
• State three reasons why organizations employ the Leavitt’s
Diamond model to introduce new systems into the workplace
• Describe four fundamental information system types based
on their sphere of influence

Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or
posted to a publicly accessible website, in whole or in part.
• Discuss the traditional and contemporary view of the role that
information systems play in an organization’s value chains
• Identify four benefits of creating a strategic plan
• Identify four drivers that help set the information system
organizational strategy

Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or
posted to a publicly accessible website, in whole or in part.
Review and discussion questions
Chapter 1

1.Describe four fundamental information system types based on their sphere of influence.

2.Identify two key management responsibilities in implementing information systems.

3.The four components of Leavitt’s Diamond are technology, processes, structure, and
_______________.

4.What is the traditional role that IS plays in the supply chain? What is the contemporary role?
Identify five consequences of Identify five federal laws that
a successful cyberattack. address computer crime.

Discuss how the CIA security


triad can be implemented at
Conduct a security self-
the organizational, network,
assessment of your own
application, and end user
computer and usage habits.
levels to safeguard against
cyberattacks.

Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or
posted to a publicly accessible website, in whole or in part.
Identify eight steps that must be taken to perform a thorough security risk assessment.

Describe five actions an organization must take in response to a successful cyberattack.

Describe the role of a managed security service provider.

Define the term computer forensics.

Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or
posted to a publicly accessible website, in whole or in part.
Review and discussion questions
Chapter 2
• 1.Provide four reasons why computer incidents are so
prevalent. Which of these do you think is the most
significant? Why?
• 2. List the four perpetrators most likely to initiate a
cyberattack.
• 3. What is the meaning of attack vector?
• 4. Identify three commonly used attack vectors.
• 5. List five cyberattacks that pose serious threats to an
organization.
Summary

Managers must use information systems to gain competitive advantage

Leavitt’s Diamond helps to successfully introduce new systems into the workplace

Strategic planning helps identify desired outcomes and formulate feasible plans to
achieve objectives

Various IS workers need a variety of skills and certifications

Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or
posted to a publicly accessible website, in whole or in part.
Computer crime is rapidly growing

Many different types of people responsible for cyberattacks

Summary Many different attack types being used

Countermeasures needed at all levels


• Organizational, network, application, end-user
• Security risk assessments, intrusion detection systems,
authentication methods, and training

Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned, copied or duplicated, or
posted to a publicly accessible website, in whole or in part.

You might also like