Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • ==Availability Management== Availability Management allows organizations to sustain the IT service availability in order to sup ...
    1 KB (154 words) - 15:48, 20 March 2007
  • ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as ...
    6 KB (885 words) - 10:12, 23 March 2007
  • ==Release Management== ...ntation of new hardware and software is also the responsibility of Release Management. This guarantees that all software can be conceptually optimized to meet th ...
    2 KB (352 words) - 16:42, 20 March 2007
  • ==Problem Management== The goal of Problem Management is to resolve the root cause of incidents and thus to minimize the adverse ...
    3 KB (480 words) - 16:20, 20 March 2007
  • ==IT Service Continuity Management== ...[[Contingency Plan Testing]], and [[Risk_Assessment_and_Treatment: | Risk Management]]. ...
    464 bytes (58 words) - 13:24, 30 April 2007
  • ==Incident Management== ...| Service Level Management]] process area. The first goal of the incident management process is to restore a normal service operation as quickly as possible and ...
    9 KB (1,371 words) - 16:40, 23 May 2007
  • ==Change Management== ...anges (fixes) - with minimum risk to IT infrastructure. The goal of Change Management is to ensure that standardized methods and procedures are used for efficien ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ==Security Management== ...urity Management is based on the code of practice for information security management also known as ISO/IEC 17799. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ==Configuration Management == ...re or software upgrade, a computer technician can access the configuration management program and database to see what is currently installed. The technician can ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ==IT Management Booklet== ...risk management processes to ensure effective information technology (IT) management.<br> ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ==Capacity Management== ...agement, Modeling, Capacity Planning, Resource Management, and Performance Management. ...
    352 bytes (43 words) - 15:46, 20 March 2007
  • ...cording to whether the risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actua Certain aspects of many of the risk management standards have come under criticism for having no measurable improvement on ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • =='''Asset Management'''== ...mation security perspective is not just about 'IT' Assets. It is about the management, control and protection of '''all''' aspects of Information / Data in whate ...
    5 KB (705 words) - 13:29, 23 May 2007
  • '''MANAGEMENT CONTROL '''<br> ...DOI A.1''']] Is there an IS steering committee or other evidence that top management is involved in the IS function and, if so, who are the members? Please prov ...
    2 KB (354 words) - 20:12, 25 June 2006
  • ==Information Security Aspects of Business Continuity Management== ==Business Continuity Management Considerations== ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ==Service Level Management== ...l processes to control their activities. The central role of Service Level Management makes it the natural place for metrics to be established and monitored agai ...
    2 KB (253 words) - 15:44, 20 March 2007
  • ==Communications and Operations Management== ...y and cost effective service to client financial institutions. Institution management should monitor any changes in the current strategies and plans of independe ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ==Service Desk Management== A '''Service Desk''' is a primary IT capability called for in IT Service Management (ITSM) as defined by the [[Information Technology Infrastructure Library]] ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ==Software Configuration Management== Software Configuration Management (SCM) is the discipline whose objective is to identify the configuration of ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ==IT Risk Management Process== ...he ability to mitigate IT risks is dependent upon risk assessments. Senior management should identify, measure, control, and monitor technology to avoid risks th ...
    4 KB (528 words) - 16:58, 28 March 2010

Page text matches

  • ==Capacity Management== ...agement, Modeling, Capacity Planning, Resource Management, and Performance Management. ...
    352 bytes (43 words) - 15:46, 20 March 2007
  • ==IT Service Continuity Management== ...[[Contingency Plan Testing]], and [[Risk_Assessment_and_Treatment: | Risk Management]]. ...
    464 bytes (58 words) - 13:24, 30 April 2007
  • ==Service Level Management== ...l processes to control their activities. The central role of Service Level Management makes it the natural place for metrics to be established and monitored agai ...
    2 KB (253 words) - 15:44, 20 March 2007
  • ==Sample Vulnerability Assessment and Management Standard== ...ectives for establishing specific standards for the assessment and ongoing management of vulnerabilities. ...
    2 KB (230 words) - 19:16, 14 January 2014
  • Provides a framework for consistent, timely, and cost-effective management decisions.<br> Management best guesses.<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • Provides a framework for consistent, timely, and cost-effective management decisions.<br> Management best guesses.<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • ==Change Management== ...anges (fixes) - with minimum risk to IT infrastructure. The goal of Change Management is to ensure that standardized methods and procedures are used for efficien ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ...g to a business and service priority and routed to the appropriate problem management team, and customers kept informed of the status of their queries. ITIL Incident Management<br> ...
    2 KB (299 words) - 17:41, 5 May 2006
  • ...rily out of [[ISO/IEC 17799]], a code of practice for information security management published by the [[International Organization for Standardization]] in 2000 ...can be used as a template to make ISO 9001 compliant information security management systems. While ISO 27001 is controls based, ISM3 is process based. ISM3 has ...
    2 KB (257 words) - 17:09, 22 March 2007
  • ...issues are recorded, analyzed, resolved in a timely manner and reported to management. . ...if a problem management system exists and how it is being used. Review how management has documented how the system is to be used. ...
    2 KB (325 words) - 19:12, 25 June 2006
  • Management should establish quality assurance procedures and update future planning wi Management should conduct quality assurance reviews for all significant activities bot ...
    2 KB (227 words) - 18:59, 17 April 2007
  • ==Sample Asset Management Standard== ...ard defines Company objectives for establishing specific standards for the management of the networks, systems, and applications that store, process and transmit ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ==Availability Management== Availability Management allows organizations to sustain the IT service availability in order to sup ...
    1 KB (154 words) - 15:48, 20 March 2007
  • ITIL Security Management, Security Management Measures<br> ITIL 4.2 Implement Security Management, Security Management Measures<br> ...
    2 KB (270 words) - 14:54, 5 May 2006
  • ==Service Desk Management== A '''Service Desk''' is a primary IT capability called for in IT Service Management (ITSM) as defined by the [[Information Technology Infrastructure Library]] ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ...sourced services is performed in accordance with the organization’s vendor management policy.<br> ...sourced services is performed in accordance with the organization’s vendor management policy. .<br> ...
    2 KB (306 words) - 18:32, 14 June 2006
  • ...sourced services is performed in accordance with the organization's vendor management policy.<br> ...nagement policy and discuss with those responsible for third-party service management if they follow such standards. ...
    2 KB (295 words) - 15:40, 25 June 2006
  • '''PO 9.1 IT and Business Risk Management Alignment'''<br> ...nagement and control framework with the organization’s (enterprise’s) risk management framework. This includes alignment with the organization’s risk appetite an ...
    3 KB (377 words) - 14:10, 8 August 2006
  • =='''Asset Management'''== ...mation security perspective is not just about 'IT' Assets. It is about the management, control and protection of '''all''' aspects of Information / Data in whate ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ==Problem Management== The goal of Problem Management is to resolve the root cause of incidents and thus to minimize the adverse ...
    3 KB (480 words) - 16:20, 20 March 2007
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)