IT OPERATIONS Session 7.

Slides:



Advertisements
Similar presentations
We use a comprehensive approach to reduce costs and increase efficiencies. TMR approaches every project with integrity, dedication, and creativity. We.
Advertisements

6.Quality, maintenance and documentation l Development cycle l Productisation l Plan for quality l Plan for maintenance; l Plan for documentation:
Effectively applying ISO9001:2000 clauses 6 and 7.
Professional Behaviour
Grow Your Business through Contact Centre Outsourcing Fanny Vaz Director, Personal Market Unit, CTM.
9 - 1 Computer-Based Information Systems Control.
Management of IT Environment (5) LS 2012/ Martin Sarnovský Department of Cybernetics and AI, FEI TU Košice ITIL:Service Design IT Services Management.
ICASAS305A Provide Advice to Clients
Managing the Information Technology Resource Jerry N. Luftman
Implementation/Acceptance Testing / 1 Implementation and Acceptance Testing Physical Implementation Criteria: 1. Data availability 2. Data reliability.
2010 EXAM REVISION.  QUALITY OF THE SERVICE  ORGANISATION & LEADERSHIP  MARKETING MANAGEMENT  DESTINATION ATTRACTIVENESS  CAPACITY OF THE CITY/VENUE.
Chapter 1 Introduction to Databases
Development and Quality Plans
Session 3 – Information Security Policies
Managing a computerised PO Operating environment 1.
System Implementation
Desktop in the Clouds Using Virtualization to Extend Client Outreach and Protect Data.
Basel Accord IITRANSITIONSERVICES Business Integration Support FCM Management Limited Paris New York Toronto.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Pre-Project Activities Text Chapters 5 and 6. Pre-Project Activities 1.Contract Review 2.Development Plan 3.Quality Plan.
Computers & Employment By Andrew Attard and Stephen Calleja.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
David N. Wozei Systems Administrator, IT Auditor.
The Software Quality Assurance System By Jonathon Gibbs Jonathon Gibbs (jxg16u) 26 th November 2009.
Introduction to Information and Computer Science Information Systems Lecture c This material (Comp4_Unit9c) was developed by OHSU, funded by the Department.
How to evaluate ICT use for small organisations Session 2.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Perspectives on Business Continuity Management Bill Wheeler, EPO.
Information Systems Security Operational Control for Information Security.
16 1 Installation  After development and testing, system must be put into operation  Important planning considerations Costs of operating both systems.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Appendix C: Designing an Operations Framework to Manage Security.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Measured Progress © New Mexico SBA iTester 3  Webinar Administration Best Practices This presentation will begin momentarily... Please call in by.
Objectives Understand Corrective, Perfective and Preventive maintenance Discuss the general concepts of software configuration management.
Database Administration Basics. Basic Concepts and Definitions  Data Facts that can be recorded and stored  Metadata Data that describes properties.
Win Phillips, Ph.D Win Phillips, Ph.D. Clinical Assistant Professor University of Missouri Columbia, MO.
Service Design.
RACHELLE BERRY COLLECTING INFORMATION TO PROVIDE SUPPORT TO CUSTOMERS.
Online Testing Infrastructure Readiness Checklist and Infrastructure Trial.
Level 2 Diploma in Customer Service
Components of software quality assurance system overview
Information Technology (IT) Audits
Components of software quality assurance system overview
COIT Planning & Budgeting
BP – Project Planning (F)
Procedures and documentation that protect relationships with employees
Information Technology
User Support
ITIL:Service Design IT Services Management Martin Sarnovský
Information Technology (IT) Department
Unit 7 – Organisational Systems Security
Relate to Clients on a business level
County HIPAA Review All Rights Reserved 2002.
LO2 - Be Able to Design IT Systems to Meet Business Needs
Providing Advice To Clients
EIDE System Requirements and Specification Documents
Developing and testing the Plan
Chapter 5 IS630.
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Software Testing Lifecycle Practice
The Survival Plan.
General Data Protection Regulation “11 months in”
Capitalize on Your Business’s Technology
Software Reviews.
Presentation transcript:

IT OPERATIONS Session 7

Session Objectives To cover the following issues in relation to a client’s IT operations : the staff roles and functions typically found within IT operations the importance of controls within the IT operations environment the identification of control weaknesses and the provision of recommendations to the client’s management

Roles and responsibilities of IT operations Capacity planning Performance monitoring Initial program loading Media management How many will I need?

Roles and responsibilities Continued Job scheduling System back-ups and disaster recovery Help desk Maintenance Network monitoring

Risks Applications problems and errors Loss of programs and data Delays and disruptions Higher risk from disasters Inadequate system capacity System downtime

Service level agreements General provisions Descriptions of services Working hours Availability targets User support Performance Contingency Security Restrictions

Management review and supervision of IT operations IT operations review Separation of duties Management monitoring Automated monitoring Need for trust

IT operations skills, training and experience Need for competent staff How does the client determine needs? Training programs Staff assessments Career development

Maintenance Hardware maintenance Infrastructure maintenance Software maintenance In-house or contracted out

Operations documentation Clear, concise and available Coverage may include Handling of data and files Scheduling instructions Errors, system failures Contacts Special runs System restart and recovery procedures Daily housekeeping and maintenance

Problem management Problem logs details Date Progress description Error codes Error description Source Initials Responsibility

Network management controls Separation of duties Responsibility Monitoring Network security

Case study Review the material on the Government Office Supplies Trading Fund and identify weaknesses in the organisation’s IT operations Use section B8 of the IT review checklist as a guide.