Information systems offer various advantages to automate manual processes that not only aid in expediting a task but also reduce human error. It also helps in reducing overall labor costs and time. Organizations across various sectors are leveraging information technology in order to gain competitive advantage over other companies and organizations. As more and more organizations are using IT to support their business, it is extremely crucial to build a robust information system platform that ensures integrity and availability of information and systems. A vital step in this direction is to have a sound Program Change Control Process …show more content…
o Information system operators must be responsible for maintaining integrity in production users. o All changes and enhancements must got through change management process. o Cost-benefit and feasibility have to be reviewed before changes are accepted and approved. o Risk of changes must be studied and a fallback plan should be developed.
• Streamline incident/problem management process. o Incident management provides information to authorized personnel when and where it is needed. o It is very critical process in IT service management as it has a direct influence on customer because:
Incident management focuses on providing increased continuity of service.
An efficient incident management system is important to reduce or remove the adverse effect of disturbances to IT services, and covers almost all operation of IT services. o At the time of handling incident, it is imperative to assess the urgency and impact to the underlying …show more content…
The interviews can be used to determine how aware employees are about their job responsibilities, about their knowledge of security procedures, level of risk awareness. By asking open ended questions a lot more information can be gathered about how well managers are performing their duties, and if the employees themselves are trained enough to perform the task in hand, if further assistance is required in terms of training, if there are any security loop holes that they have observed in their day to day activities. Such a test can also through some light in to actual segregation of