0% found this document useful (0 votes)
37 views

IT Practical Revision: by Joel Goredema

The document discusses topics related to IT practical revision including: - The project lifecycle phases of initiation, planning, execution, and evaluation - Feasibility reports which determine if a project is viable and what resources are needed - Methods of collecting, storing, and presenting data while ensuring cyber security and adhering to data protection laws - Types of cyber attacks such as those exploiting insecure networks, devices, software or weak authentication methods

Uploaded by

joel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

IT Practical Revision: by Joel Goredema

The document discusses topics related to IT practical revision including: - The project lifecycle phases of initiation, planning, execution, and evaluation - Feasibility reports which determine if a project is viable and what resources are needed - Methods of collecting, storing, and presenting data while ensuring cyber security and adhering to data protection laws - Types of cyber attacks such as those exploiting insecure networks, devices, software or weak authentication methods

Uploaded by

joel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

IT Practical revision

By Joel Goredema
• Project lifecycle
• Feasibility report
• SMART
• DATA TYPES
• Methods of reducing the vulnerability of a system
• Storage of personal data
• Presenting data and information
• Methods of collecting data
• Loyalty schemes
• Types of cyber security Attacks
Project Lifecycle

Initiation

Evaluation Planning

Execution
Feasibility report

• Is an output of the Initiation phase but an input of the planning


phase
It includes the answers to all the questions asked during the initiation
phase .The report can also include different solutions for the client.
The client can the select the solution they would like to be created .
Advantages
• Can be used to make sure that the project is feasible to go ahead ,
saving time and money on the project
• Can be used to look at what resources (ie software ,hardware
,people)will be needed for a project for a project ,this allows the
project manager to make sure these resources are already
available or to buy them in advance or not .Allows the projects
timescale to be considered ,how long tasks will take so that the
project is successful and can be completed on time .Looks at the
benefits of the project and whether it is economically visible to go
ahead i.e cost effective.
Smart goals

• Objectives are targets you want to achieve


• They are defined by the client.
• They are to ensure that nothing is left out
• Main ways to get objectives is by using smart
Data types
Methods of reducing the
vulnerability of a system
Storage of personal
data

• DATA PROTECTION ACT -Needs to be


adhered to during the collection of data and
the storage by making sure there is a fire
wall ,encrypted server and extras . It should
be kept up to date, and is processed and
transferred fairly and lawfully ,can only be
held for specific purpose.
Presenting data
and information
Methods of collecting
data
Loyalty schemes
• A reward program offered by a business to its customers
• Advantages to customer
1. They can use the data to learn about the customers shopping
habits so that they can use it for targeted marketing.
2. Easy to collect data.
3. Can be used to plan and predict what stock will be needed.
• Disadvantages
1. Data might not always be reliable as they could be given too
others too use.
2. A loyalty scheme costs the business money to set up and
operate –must be cost effective.
3. It makes them more likely to be a target for a cyber security
Types of cyber
security Attacks
• Cyber security attacks can happen as a result of:
• Insecure network –no protection such as fires or up to date malware in
place
• Insecure network
• Insecure device
• Insecure software applications
• Insecure modems
• Lack of authentication (username/passwords)or weak passwords
• Social engineering –manipulating people into giving out details such as
usernames and passwords.

You might also like