0% found this document useful (0 votes)
9 views11 pages

Practical Notes

Chapter 6 discusses Service Management and the ITIL framework, emphasizing its benefits such as cost reduction, improved service quality, and business alignment. It outlines the five phases of ITILv3 and various processes like Incident Management and Change Management, detailing their key benefits and KPIs. Chapter 7 introduces TOGAF for architectural development and explores outsourcing strategies, while Chapter 8 focuses on Risk Management, outlining its processes and the importance of accountability in managing risks.

Uploaded by

shoug
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views11 pages

Practical Notes

Chapter 6 discusses Service Management and the ITIL framework, emphasizing its benefits such as cost reduction, improved service quality, and business alignment. It outlines the five phases of ITILv3 and various processes like Incident Management and Change Management, detailing their key benefits and KPIs. Chapter 7 introduces TOGAF for architectural development and explores outsourcing strategies, while Chapter 8 focuses on Risk Management, outlining its processes and the importance of accountability in managing risks.

Uploaded by

shoug
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CHAPTER 6

Service Management: optimizing the ability of IT to provide services that are cost-
effective and meet the needs of the business.

Benefits:

o Reduce total cost and operation


o Improve service quality and reduce errors
o Meet user's needs
o Improve regulation compliance
o Business/IT alignment

Information Technology Infrastructure Library (ITIL): Best practice framework that


Facilitate the management and delivery of quality IT services.

Benefits:

o Flexible
o Scalable
o Vendor neutral
o Focus on best practices
o Improve compliance

ITIL consist of best practices lifecycle phases and key processes to manage IT services.

Advantages of ITIL

Customer and Business IT organization

o Deliver better service quality to o Improve organization structure.


customers. o Facilitate control of IT scalability
o Better description of services o Facilitate process of selecting
o Effective service management service for outsourcing
o Improve communication with IT org. o Facilitate compliance with
o Better visibility of cost to the customer organization
Five Phases of ITILv3

Service Strategy: This phase includes the design, development, and implementation
planning of Service Management.
Service Design: This phase includes the design phase for IT service, including architect,
processes, suggested metrics, and others.
Service Transition: This phase involves the transition of the service process, moving from
current to future strategy.
Service Operation: This phase involves achieving effectiveness and efficiency in providing
services to ensure value for customers.
Continual Service Improvement: The phase of maintaining the value for the customer
by making improvements and service introduction.

Process: a set of activities to accomplish a specific goal.

Function: is a team or group specialized who are responsible for specific outcomes.

ITIL Process Examples:

1) Service desk: a communication center that provides a single point of contact between
a company, customers, and the IT team to manage incidents.

Key Benefit:

o Report incident!
o Cost reduction through efficient use of resources
o Provide service support.

KIPs:

o Number of incident reported by Type


o Number of calls handled
2) Incident Management: Define process for recording and resolving incidents to
provide better level of service quality and availability.

Key Benefit:

o Ensure the best use of resources


o Ensure the incident are detected

KPIs:

o Total number of incident reported


o Average cost per incident

3) Problem Management: supports incident Management by providing workarounds


and quick fixes but does not have the responsibility for resolving the incidents.

Key Benefit:

o Focus of root cause analysis


o Support fault management and service desk
o Better utilization of technical aspects

KPIs:

o Number of problem reported


o Number of closed problem

4) Release management: The process of planning, designing, scheduling, deploying,


and controlling technical and non-technical aspects of releases.

Key Benefit:

o Provide a consistent and customer-focused approach


o Better control on installed hardware and software

KPIs:

o Number of major emergencies released.


5) Service Level Management: Maintains IT service quality and performance.

Key Benefits:

o Ensure IT is focused on most important areas


o Ensure customer requirements are known

KPIs:

o SLAs
o Customer satisfaction survey

6) Capacity Management: deals with service capacity management and ensure it is


scalable and cost effective.

Key benefits:

o Ensure that the existing infrastructure is optimized in terms of capacity


o Understand the way infrastructure is used

KPIs:

o Capacity
o Speed Metrix - Volume

7) Availability Management: Optimizes the capability of the IT infrastructure, services to


deliver a cost effective and sustained level of availability that enables the business to
achieve its business objectives.

Key Benefits:
o Service can be designed to meet target service levels
o Provides A formal way to measure availability of IT services

KPIs:

o Rate of availability
o Overall uptime and downtime
8) IT Service Continuity Management (ITSCM): Supports the business continuity
management process by planning for incident prevention, prediction, and management.

Key Benefits:

o Improve IT/ Business relationship


o Decreases the cost and impact to the business when a crisis occurs

KPIs:

o Impact and cost


o Lower insurance premium

9) Information Security Management: Ensures a high level of security, so that the IT


infrastructure and services.

Key Benefit:

o Provides secure policies and procedures to protect infrastructure


o Create awareness to protect and secure IT resources

KPIs:

o Number of security breaches


o Cost of security

10) Configuration Management: maintain, document, and verify the configurations


services of infrastructure.

Key benefit:

o Record the information required to manage IT services


o Effective delivery of IT services

KPIs:

o Number of planned and unplanned changes


o Average cost and time to make changes
11) Change Management: The process of controlling changes to improve infrastructure
and service with minimum disruption.

Key Benefit:

o Minimize number of unauthorized changes


o Minimize risks caused by failed change

KPIs:

o Number of requested changes


o Number of successful changes

12) IT Financial Management: Provides cost-effective of the IT assets and resources used
in providing IT services including accounting and charging of services.

Key benefit:

o Provide accurate cost information


o Allow for recovery of cost

KPIs:

o Cost Tracking

Best Practice: is a method or technique known to produce superior outcomes if followed


and used as a benchmark.

o Lean: a production philosophy that focuses on creating and managing the flow of
value. (the value flow is defined by lean)

o Agile: a collection of software development methodologies that helps teams to


deliver value faster. (things flow much faster)(adapts with the situation as we
proceed)

o DevOps: a professional movement that ensures communication and collaboration


between software developers and IT professionals. (used for software developers)

o ITSM: a set of specialized organizational capabilities for providing value to


customers in terms of IT services.
Business/IT Challenges:

o IoT rapidly increasing


o Customers value outcomes, not products
o Time-to-value is replacing time-to-market
o Customer delight is more important than customer satisfaction

How to address these challenges:

o Avoid local optimization


o Adopt more than a single best practice framework
o Address culture by guiding principles
o Continual improvement

ITIL 4 Guiding Principles:

1. Focus on value.
2. Start where you are
3. Progress iteratively with feedback
4. Collaborate and promote visibility.
5. Think and work holistically
6. Keep it simple and practical.
7. Optimize and automate
CHAPTER 7

TOGAF is Used for Developing Architectural to meet specific business needs.

TOGAF Components:

o ADM (Architect Development Method): Guidelines of how architecture


could be implemented and what processes can be used.

o Foundation Architect: Associated with a detailed taxonomy of services.

o Resource Base: Helps determine the requirements.

Outsourcing is a critical component of IT governance which create business


relationships with third party service providers to facilitate businesses goals.

Strategic outsourcing Tactical outsourcing


Strategic outsourcing is a long-term and Tactical outsourcing is a short-term and
result-oriented approach where an transactional-focused approach that works
organization obtains services from an best for small and medium-sized companies.
external source. Assets and processes are can include staff supplementation and easily
transferred to service providers. scalable IT services where there are no asset
transfers.

Onshore outsourcing – obtaining services from an external source in your home country.

Rural outsourcing – where an organization obtains the services of an external source in


a rural area of the home country, where the service is usually less expensive.

Near - shore outsourcing – refers to a service provider located in a country which is near
to your home country.

Offshore outsourcing – refers to contracting with a company that is geographically


distant, like India, Ireland, and China, where an ocean separates the countries.

Best - shore outsourcing – offer the best ‘deal’ for the customer.
What do organizations outsource:

Any IT function can be outsourced such as:

o IT architecture
o IT infrastructure
o system and software development
o web development and hosting.
o Training, education, and certification

Benefit of outsourcing from organization perspective:

o Enable business to focus on strategic function.


o Lower annual operating costs.
o Increase speed to market.
o More politically acceptable.

Benefits from a service provider perspective:

o Substantial revenue stream potential and growing global market.


o long-term customer relationships
o Increasingly, customers are going with a limited number of strategic sourcing
specialists to develop longer term relationships and negotiate better deals.

Barriers and Risks of Outsourcing:

o Loss of control
o Function or process is too critical to outsource
o Poor outsourcing process management
o Loss of flexibility due to inflexible contract
o Different In culture and time zone relating to offshore deals
o Lack of security and data protection.
CHAPTER 8

Risk Management: The process of assessing the risks to an organization's information


and determining how to control or mitigate those Risks.

The Process of Risk Management Include: Identification, assessing, prioritizing, and


controlling risks.

Knowing Yourself Knowing Your Enemy


Identify, examining and understand the Identify, examining and understand the
information and how it is processed, stored threats facing the organization's information
and transmitted. assets.

Risk Management Cycle:

Assessing Risk: Identify and prioritize risks to the organization.

Conducting Decision Support: Identify and select control solutions


based on a defined cost-benefit analysis process.

Implementing Controls: Deploy control solutions to reduce risk.

Measure Program Effectiveness: Report on the effectiveness of


deployed controls to manage risk.

Accountability for Risk Management:

Information security: Leading role in addressing risk.

Information technology: building and maintaining secure systems.

Management: resource allocation and prioritization of security concerns.

Users: Early detection and proper response to threats.


Steps in Risk Management

I. Evaluate the risk controls.


II. Determine which control options are cost-effective.
III. Installing appropriate controls.
IV. Ensure controls remain effective.
V. Identify risks.
VI. Assess risks.
VII. Summarize the findings.

Information Asset Inventor Creation: Asset Information relate to IT system components


including:

o People
o Procedure
o Data
o Software and Hardware
o Networking

Vulnerability: weakness in an asset that can be exploited to breach security.

Risk Assessment Formulas:

R = PV (Risk = Probability of Risk Event * Value Lost or Vulnerability)

R = Pa Ps V (Risk = Probability of Attack * Probability of successful Attack * Value)

R = (P * V) - CC + UK (Risk = Probability of Attack or Likelihood * Value of Asset –


Current Control + Uncertainty Knowledge of Risk)

The Goal is,

o To identify information assets and their vulnerabilities.


o To rank them according to the need for protection.

You might also like