• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: MIS5205-Introduction
      • Week 2: Framework-Function-Process
      • Week 3: GCC-DBMS
      • Week 4: Operating Systems
      • Week 5: OS Auditing and IT Risk Assessment
      • Week 6: Network and Network Auditing
      • Week 7: Service Level Agreement
    • Second Half of the Semester
      • Week 8: Datacenter Operations Review
      • Week 9: BCP and DR
      • Week 10: Application Control
      • Week 11: Information Security
      • Week 12: Change Management and Licensing
      • Week 13: Fall Break/No Class
      • Week 14: Auditing Capacity/Performance/EndUser Computing
      • Week 15: Emerging technology risks and controls (presentation)
  • Assignments
    • Team Assignment #1
    • Team Assignment #2
    • Team Assignment #3
    • Emerging technology
    • Cybersecurity/Data Breach
  • Webex
  • HBR Coursepack
  • Roster
  • Gradebook

ITACS 5205

Temple University

Week 8 Questions

Week 8 Questions

October 20, 2016 by Heather D Makwinski Leave a Comment

Read the following case study, and prepare to answer the following questions as groups. Please elect a team leader for this assignment. We will discuss BCP/DR next week.

 

Engro Chemicals Case Study

 

What were the risks faced by Engro after the fire had left its head office in ruins?

Explain the purpose of the Disaster Recovery Plan (DRP). What features were omitted from the plan?

The systems were not integrated and this made it simpler for Engro to recover from the disaster. Does this negate the concept of Enterprise Resource Planning?

Why in your opinion, did Engro deviate from the DRP?

Week 7 Questions

October 13, 2016 by Heather D Makwinski 99 Comments

What are the benefits and risks of out-sourcing?

What controls can be implemented to mitigate the risks associated with outsourcing?

Explain common SLA issues identified by auditors

Outsourcing and SLA audit questions

Week 6 Questions

September 29, 2016 by Heather D Makwinski 195 Comments

What is OSI model? What’s the main function of each OSI layer?

What are the advantages of VPN?

 

Week 4 & 5 Questions

September 22, 2016 by Heather D Makwinski 181 Comments

Why is so important to protect operating systems?

List common ontrol issues associated with operating systems and remediation strategy/plan.

 

Week 3 Questions

September 14, 2016 by Heather D Makwinski 225 Comments

What are key characters of relational database management systems?

Key benefits of relational databases vs traditional file system?

List risks associated with database management systems (DBMS)

Week 2 Questions

September 8, 2016 by Heather D Makwinski 248 Comments

Explain the key IT audit phases

What are the key activities within each phase?

Comparing ITIL and COBIT: list some key similarities and difference based on your understanding

Why do we need control framework to guide IT auditing?

Week 1 Questions

September 1, 2016 by Heather D Makwinski 293 Comments

What are some current system-related risks that you have experienced in your organization?

How does the control environment affect IT?

What is the purpose of all auditors having some understanding of technology?

Week One You-Tube Video:

What issues did you identify from this video?

Welcome to MIS5205 – IT Service Delivery and Support

July 14, 2016 by Liang Yao

photoFall 2016 Class Schedule:

Every Wednesday starting  August 31st, 2016

Learnerthone (5 sessions) 5:30 pm – 8:00 pm

Meetups ( 10 sessions) 5:30 pm – 7:00 pm

Meeting Location: Online via WeBex

All IT Auditor Candidates – Welcome to MIS5205!

MIS 5205, IT Service Delivery and Support, is to teach students assessing risk associated with technology service delivery and supports function from operation aspects, such as operating system, network and database administration, change management, service level agreement monitoring, problem and incident management and disaster recovery plan, etc. Students will learn how to evaluate IT operations from internal control point of view following various control assurance frameworks. The course is designed to teach students foundational knowledge of auditing the technical infrastructure of large institutions and assessing how this infrastructure provides a reliable and secure platform for business applications and end users. The course will build a foundation for students to understand the service center management and how IT operation teams are utilized to deliver value to the organization. Most importantly, student will learn how to identify key risks within various IT operation functions and how to evaluate controls that can mitigate those risks. Staring 2015, the course will be taught online via lectures, reading assignments, individual and group projects.

The class will begin on Wednesday, August 31st at 5:30 pm when we will go through the structure of the course as well as my expecting from you. This session will be our first Webex meetings.  I expect that you will join with full video working.   On Thursday of each week I will publish a list of readings questions for you to comment on using our class blog.  I am looking for you to write a one or two paragraph comment on one of the questions and then comment on each other’s submissions during the week.

Liang Yao

MBA, MS, CIA, CISA, CISSP

 

Primary Sidebar

Weekly Discussions

  • Weekly Questions (7)
  • Welcome (1)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in