Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
Four Ps of Service Design
|
People, process, Products, Partners
|
|
Goals of Service Design
|
Convert Strategic objectives, use a holistic approach for design, and ensure consistent standards
|
|
Processes of Service Design Lifecycles
|
1- Service Level Management
2- Capacity management 3 - Availability 4 - ITSCM 5 - Info Sec 6 - Supplier Mgmt 7 - Service Catalogue |
|
OLA (Operational Level Agreement)
|
Internal agreement with another area of the same organization
|
|
Different Levels of a SLA
|
Corporate, Customer, Service
|
|
Goal of Service Catalogue Mgmt.
|
Ensure that a Service Catalogue is produced and available
|
|
Two aspects of a Service Catalogue
|
Business Service catalogue
Technical Service catalogue |
|
Capacity Mgmt manages:
|
- The right capacity
- at the right location, moment, customer, right costs |
|
Sub processes of Capacity Mgmt
|
Business Capacity Mgmt
Service Capacity Mgmt Component Capacity Mgmt |
|
What does Business Capacity Mgmt do?
|
Manages capacity to meet future business requirements for IT Services, identifies changes in business
|
|
Activities in Capacity Mgmt.
|
Performance Monitoring
Demand Mgmt Application Sizing Modelling Tuning Storing Capacity Mgmt data Reporting Capacity Planning |
|
Goal of Availability mgmt.
|
Ensure level of availability matches or exceeds what is defined in SLA
|
|
MTBSI =
|
MTRS + MTBF
|
|
What is uptime
|
MTBF
|
|
What is downtime
|
MTRS
|
|
What is IT Service Continuity Mgmt
|
Disaster Recovery
|
|
Key Activities of ITSCM
|
BIA, Risk Assesment, defining countermeasures
|
|
Goal of Information Security Mgmt.
|
Align IT Security with business security, ensure CIA
|
|
Four Perspectives of InfoSec
|
Organizational, Procedural, Physical, Technical
|
|
Activities of InfoSec
|
Control : Threats -> Incidents -> Damages -> Control
|
|
Measures of InfoSec
|
Prevention/Reduction, Detection, Repression, Correction, Evaluation
|
|
InfoSec Security Measure Matrix
|
Measures down Y, Perspectives across X
|