Академический Документы
Профессиональный Документы
Культура Документы
Individual
Session 5
Tobe SubmittedWeek (i+1)th
You only need to do this for four (4) articles of your choice out of ten
(10) articles covered in all sessions.
If you choose article from session i you should submit the summary in
session (i+1), the week after; except if the article is from session 10. For
this, you should submit the summary during exam period or submit to
the secretary at the 8th floor during exam period.
Recent technological breakthroughs have increased data storage and data backup,
making it easier and cheaper to save more data than ever before. By increasing large
volumes of data now cheaper and more accessible, you can make business decisions
that are more accurate and precise.
Finding value in big data is not just about the analysis process. This is a discovery
process that requires tangible analysis, restoring patterns, making assumptions, and
predicting data so that what you get can help make the right business decision.
Big data can help you innovate with relationships between people, institutions,
entities, and processes and then determine new ways to use that new knowledge. You
can use data insights to improve decisions about financial and planning
considerations. Receive trends and what customers want in new products and
services. Big companies like Netflix and Procter & Gamble use big data to ask for
customers' desires. They use data by seeing how their customers use their products.
Based on these data, they will then develop new innovations for their products and
services. In addition, P&G also uses data and analysis from various channels such as
focus groups and social media. You can also use data to apply prices to your services
and products. You can do a lot with big data.
In short they allow businesses to do things that could not be done before; or at least
do things in a cheaper and smarter way.
Enablers are factors that affect individuals and collect the function and performance
of object, but in this case the object is management of information system and
technology in companies that use COBIT 5 work.
COBIT 5 has 7 Enablers in the COBIT 5 work agreement, the 7 enablers are:
1. Principles, policies and frameworks, are means for translating desired behavior into
practice guidelines for daily management.
2. Process, describes a number of practices and activities organized to achieve certain
objectives and produce a number of outputs in support of the achievement of all IT-
related objectives.
3. The organizational structure, is a key decision-making entity in the company.
4. Culture, ethics and behavior of individuals and companies are often seen as a
limiting factor for success in governance and management activities.
5. Information is spread throughout all parts of the organization and also includes all
information generated and used in the company. Information is needed to keep the
organization running and well managed. However, at the operational level,
information is often considered as a result of company processes.
IT Security and Risk Management (Risk Management) is the process of taking risks,
assessing risks, and taking steps to minimize risks to control and guarantee risks
remain at an acceptable level. IT Risk Management seeks to protect confidentiality,
integrity and availability (CIA). Namely by minimizing the impact that might arise
which can have an impact on the confidentiality of information, data integrity in the
system, and the availability of system infrastructure
The main reason why organizations need to implement a risk management process is
to support the organization's mission and protect the organization's assets. In IT
security and Risk Management, it is closely related to how security is implemented in
an organization so that an understanding of the organization's business processes and
possible risks that affect business processes is required. Risk Management will
greatly help the organization's management to balance the impact of risks and costs
needed to minimize this risk.
In recent years, Cyber Security has made an increase due to increasing Cyber risk
with the size and number, and the level of influence on individuals, governments and
organizations. Most organizations that are aware of the dangers of cyber attacks now
regard Cyber Security as an important issue.
The cost for cyber has been increasing for some time, and it can take months for third
parties to obtain it depending on the type of attack. For example, APT (continued
threat continually) uses continuous hacking techniques to gain access to a computer
system and can stay inside for months before it can be discovered.
IT security pretty much covers all of the types of security within a network, from
components like databases and cloud servers to applications and the users remotely
accessing the network. They all fall under the IT security umbrella.
Within this is another term to know information assurance. This means that any
important data won’t be lost or stolen in the event of an attack or a disaster whether
that’s a tornado wiping out a server center or hackers breaking into a database. It’s
commonly addressed with things like backups and offsite backup databases and rests
on three main pillars: confidentiality, integrity, and availability. These philosophies
carry over into every other aspect of security, whether it’s application security or
wireless security.
IT security experts (also, system administrators and network admins, which we’ll talk
about next) are one of the most important team members you can hire. They’re
responsible for the safety and security of all of a company’s hardware, software, and
assets, and regularly audit back-end systems to ensure they’re airtight. Through
security analysis, they can identify potential security problems and create “protect,
detect, and react” security plans.
The results show that learning outcomes for online learners are comparable to
traditional students at the secondary school and university levels. In fact, many
leading universities now offer online courses.
Students do not need to spend time or resources to travel. With online learning, there
is no need to spend money on transportation. Students You can learn to use any
device with an Internet connection.
Online learning is a great tool for someone who has a strong sense of self-discipline
and is able to study without the assistance of others, but for someone without these
skills, it is mostly useless as they might find it hard to motivate themselves to actually
sit down and study.
Other than being affected by the skills and preferences of learners, teaching methods
also get affected by the area being studied. For example, certain soft-skills like
business storytelling or conflict management would do much better in a collaborative
environment since nonverbal communication can often be a very important element
of the subject at hand.
With online learning, this is a good choice, but it's amazing to combine some of the
strengths offered by face-to-face learning into the online environment. Doing so
changes the online learning experience of a child who just sits in front of a computer
reading, pushes him to a place where they still have the freedom to learn from home
and according to their schedule, but are also taught and led by a direct expert who
lives in the place
This is where the teacher and the student meet in a set place for a set time, for either
one-on-one learning or, most commonly, in group class lessons similar to what
happens in school. Face to face learning is a really effective way to learn knowledge
and skills because it often combines different ways of learning including writing,
reading, discussion, presentations, projects, group work, film clips, demonstration and
practice.