BSBCRT611 DLA 6 2

docx

School

Deakin University *

*We aren’t endorsed by this school

Course

611

Subject

Business

Date

Feb 20, 2024

Type

docx

Pages

8

Uploaded by BrigadierAnteaterMaster276

Report
Distance Learning Activity 2: BSBCRT611 Apply critical thinking for complex problem solving
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Distance Learning Activity 2: BSBCRT611 Apply critical thinking for complex problem solving Copyright 2022 Australian College of Business Intelligence All rights reserved Version: 22.0 Date Modified: January 2022 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission of Australian College of Business Intelligence. Disclaimer: The Australian College of Business Intelligence does not invite reliance upon, nor accept responsibility for, the information it provides. The Australian College of Business Intelligence makes every effort to provide a high-quality service. However, neither the Australian College of Business Intelligence, nor the providers of data, gives any guarantees, undertakings or warranties concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information from another source if it is of sufficient importance for them to do so. Distance Learning Activity 2: BSBCRT611 Version: v22.0 Page 2 of 8 Developed by: ACBI Approved by: DoS Issued: January 2022 Review: January 2022
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Distance Learning Activity 2: BSBCRT611 Apply critical thinking for complex problem solving 1. Instructions to Learners Purpose of this Distance Learning Activity This Distance Learning Activity will develop your knowledge and understanding of critical thinking. What you are required to do For this Distance Learning Activity, you are required to answer the following questions. Resources To complete this Distance Learning Activity, you may also refer to the resource below: BSBCRT611 Apply critical thinking for complex problem solving learner guide – provided on Moodle BSBCRT611 Apply critical thinking for complex problem solving slides – provided on Moodle How to submit your Distance Learning Activity Always submit your Distance Learning Activity on time by the due date. Your completed Distance Learning Activity must be uploaded onto Moodle by 11.55pm on Sunday of week 6. File naming convention When submitting your Distance Learning Activity, use the following naming convention Unit of Competency code (ie. BSBCRT611) ‘DLA’ followed by the week number Your first name and initial of last name. Capitalise only the first letter of names. Then insert a dash, followed by submission attempt. Hence as an example of incorporating the three points above your file name or subject line should appear this way: BSBCRT611 DLA 6 – JessieA #1 Distance Learning Activity 2: BSBCRT611 Version: v22.0 Page 3 of 8 Developed by: ACBI Approved by: DoS Issued: January 2022 Review: January 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Distance Learning Activity 2: BSBCRT611 Apply critical thinking for complex problem solving 2. Questions Answer the questions below using the space provided: Answer all parts of each question Use your own words and give examples wherever possible The quality of your answer is more important than how long it is Enter your answers in this document You may use various sources of information to inform your answers, including your resources provided by ACBI, books, and online sources. You must acknowledge and cite your sources. Question 1. Read the article below, then answer the following questions: https://casestudies.mit.edu/problem-solving/ How can the term IDEAL be defined? How can you develop a problem-solving process? How has IAM contributed to meeting those needs? What are the technical components of the solution provided? What is the role of decision making in problem solving? Answer in 300-600 words. Write your answer here IDEAL – It is a problem-solving strategy that can be used when there is no one correct way to solve the problem. It is a heuristic way of handling a problem and approaching the solution. IDEAL Stands for - I – Identify the Problem D – Define the Problem E – Explore the ways to solve the problem A – Action on best-explored method L – Look Back and learn Developing a Problem-Solving Process - The first step is to identify the problem followed by finding the root cause of it. It is important because a similar problem can be caused by different events. Hence, it is crucial to identify which event caused it and how it was initiated. The best way to identify the cause of the problem is by asking questions and gathering as much information as possible. - Identify where does the problem fit. Ask yourself if you are sure that what you are building Distance Learning Activity 2: BSBCRT611 Version: v22.0 Page 4 of 8 Developed by: ACBI Approved by: DoS Issued: January 2022 Review: January 2022
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Distance Learning Activity 2: BSBCRT611 Apply critical thinking for complex problem solving fits into a bigger picture. - Set a time frame to solve a problem - Check if you have the skills to solve the problem at hand or do you need to farm out the skills. Identify how much do you need to learn the skills required to solve the problem. - Check if you have the necessary tools and resources to break down the problem and solve it. - Identify and optimize your rhythm to solve the problem more efficiently. - Evaluate the resources to see if you have enough to fix the problem. Contribution of IAM – Identity and Access management - Keeps user credentials safe - Keeps all login information and password in one place which makes it easy to export or use the data for other modules if required - Streamlining monitoring efforts - Easy management of user data Technical components of solutions provided – Following strategies proved to be good for solving problems efficiently - IDEAL – Identify, Define, Explore, Act, Look - Brainstorming - Root cause analysis - Importance of problem descriptions - Methods of Communication - How Huddles work Role of decision making in problem-solving - Decision making plays a vital role in solving a problem efficiently. When faced with a problem, break it down into manageable components that requires decision to be made. Every decision at every component will define a way to get closer to find the root cause of the issue. Identifying root cause of the problem is crucial to rectify the problem permanently. - Decision making process involves Understand the problem and identify if any action is required. Accumulate all the facts and try to understand their causes. Perform brainstorming to identify possible solutions and options. Compare all the advantages and disadvantages of the options. Distance Learning Activity 2: BSBCRT611 Version: v22.0 Page 5 of 8 Developed by: ACBI Approved by: DoS Issued: January 2022 Review: January 2022
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Distance Learning Activity 2: BSBCRT611 Apply critical thinking for complex problem solving Question 2. Research and analyse current industry trends in database management and how organizations are adopting the solutions. Then answer the following questions: a) What are the organizational needs that are solved by these solutions? b) What are the legislative requirements in Australia in relation to database security? c) How can organizational processes impact database design? d) What are the main cyber security needs in database management? e) What problems can you solve in a business environment through database solutions? Answer in 300-600 words. Write your answer here a. Organizational need for database management - To access data from different graphical location - Ability to store data without any concerns of structural changes and data location. - Settings restriction on the data and services being used by users - Working with a broad range of data b. Legislative requirements in Australia in relation to Database Security - The Privacy Act 1988 was amended in 2012 and a Privacy amendment act has been implemented. - The key feature of amendment includes all businesses who keeps data to report or inform to office of Australian Information commissioner. - Notifiable Breach Policy – This policy requires all enterprises to notify the Australian Information Commissioner of any suspected data breaches affecting any of their customers, subscribers, or clients. - Businesses that are affected by data breaches must tell individuals whose personal information may have been compromised within 30 days. During this time, the company should also begin an investigation into the potential data breach. - Businesses who do not comply with notifiable breach policy would get fined heavily. c. Organizational processes impact database design - A business process is a set of structured operations that are carried out in order to complete a Distance Learning Activity 2: BSBCRT611 Version: v22.0 Page 6 of 8 Developed by: ACBI Approved by: DoS Issued: January 2022 Review: January 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Distance Learning Activity 2: BSBCRT611 Apply critical thinking for complex problem solving business task. While designing database, it is important to link it to business priority and business processes to achieve smooth functioning of the business model. Business processes plays an important role in defining and designing the scope of the data model. During database design, the business process comes in to play in the below mentioned scenarios - Master Data Management – Consolidated data of entire business – Product, Customer base, Suppliers etc. - Data Governance - Data governance is a subset of data management that focuses on people and processes and can benefit from the application of a structured process model. - Data Quality - The importance of business processes in data quality cannot be overstated. There are numerous methods for cleansing, validating, and enriching data, as well as numerous tools and methodologies available to support data quality in this manner. However, if data quality procedures are utilised in isolation, without considering how they are used in business processes, they are bound to be useless. - Data Analytics – Big data analytics d. Cyber Security needs in database management - To prevent data breaches - To avoid penalties for non-compliance - To protect brand reputation - To ensure business continuity - To prevent from database security vulnerabilities like o Deployment failures o Insider threats o Human error o Excessive Privilege o Buffer overflow attack o SQL/Non SQL injection attacks o Dos/DDos attack o Malicious software Best practices to secure database - Add physical database security - Separate database server - Automate identity and access management - Monitor database activity - Turn off public access network - Encrypt Data - Setup database firewall - Create database backups e. Problems solved by database solutions - Decentralized database management Distance Learning Activity 2: BSBCRT611 Version: v22.0 Page 7 of 8 Developed by: ACBI Approved by: DoS Issued: January 2022 Review: January 2022
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Distance Learning Activity 2: BSBCRT611 Apply critical thinking for complex problem solving - Data security - Increasing data volumes - Limits on scalability - Growing complexity in landscape Distance Learning Activity 2: BSBCRT611 Version: v22.0 Page 8 of 8 Developed by: ACBI Approved by: DoS Issued: January 2022 Review: January 2022