Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • ==Availability Management== Availability Management allows organizations to sustain the IT service availability in order to sup ...
    1 KB (154 words) - 15:48, 20 March 2007
  • ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as ...
    6 KB (885 words) - 10:12, 23 March 2007
  • ==Release Management== ...ntation of new hardware and software is also the responsibility of Release Management. This guarantees that all software can be conceptually optimized to meet th ...
    2 KB (352 words) - 16:42, 20 March 2007
  • ==Problem Management== The goal of Problem Management is to resolve the root cause of incidents and thus to minimize the adverse ...
    3 KB (480 words) - 16:20, 20 March 2007
  • ==IT Service Continuity Management== ...[[Contingency Plan Testing]], and [[Risk_Assessment_and_Treatment: | Risk Management]]. ...
    464 bytes (58 words) - 13:24, 30 April 2007
  • ==Incident Management== ...| Service Level Management]] process area. The first goal of the incident management process is to restore a normal service operation as quickly as possible and ...
    9 KB (1,371 words) - 16:40, 23 May 2007
  • ==Change Management== ...anges (fixes) - with minimum risk to IT infrastructure. The goal of Change Management is to ensure that standardized methods and procedures are used for efficien ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ==Security Management== ...urity Management is based on the code of practice for information security management also known as ISO/IEC 17799. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ==Configuration Management == ...re or software upgrade, a computer technician can access the configuration management program and database to see what is currently installed. The technician can ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ==IT Management Booklet== ...risk management processes to ensure effective information technology (IT) management.<br> ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ==Capacity Management== ...agement, Modeling, Capacity Planning, Resource Management, and Performance Management. ...
    352 bytes (43 words) - 15:46, 20 March 2007
  • ...cording to whether the risk management method is in the context of project management, security, risk analysis, industrial processes, financial portfolios, actua Certain aspects of many of the risk management standards have come under criticism for having no measurable improvement on ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • =='''Asset Management'''== ...mation security perspective is not just about 'IT' Assets. It is about the management, control and protection of '''all''' aspects of Information / Data in whate ...
    5 KB (705 words) - 13:29, 23 May 2007
  • '''MANAGEMENT CONTROL '''<br> ...DOI A.1''']] Is there an IS steering committee or other evidence that top management is involved in the IS function and, if so, who are the members? Please prov ...
    2 KB (354 words) - 20:12, 25 June 2006
  • ==Information Security Aspects of Business Continuity Management== ==Business Continuity Management Considerations== ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ==Service Level Management== ...l processes to control their activities. The central role of Service Level Management makes it the natural place for metrics to be established and monitored agai ...
    2 KB (253 words) - 15:44, 20 March 2007
  • ==Communications and Operations Management== ...y and cost effective service to client financial institutions. Institution management should monitor any changes in the current strategies and plans of independe ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ==Service Desk Management== A '''Service Desk''' is a primary IT capability called for in IT Service Management (ITSM) as defined by the [[Information Technology Infrastructure Library]] ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ==Software Configuration Management== Software Configuration Management (SCM) is the discipline whose objective is to identify the configuration of ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ==IT Risk Management Process== ...he ability to mitigate IT risks is dependent upon risk assessments. Senior management should identify, measure, control, and monitor technology to avoid risks th ...
    4 KB (528 words) - 16:58, 28 March 2010
  • ...ves, or from programs, projects or service improvement initiatives. Change Management can ensure standardized methods, processes and procedures are used for all ==Change management in development projects== ...
    4 KB (523 words) - 10:24, 23 April 2010
  • ==Sample Configuration Management Standard== ...e objectives established in the [[Sample_Asset_Management_Policy:|'''Asset Management Standard''']], and provides specific instructions and requirements for esta ...
    5 KB (681 words) - 21:56, 15 January 2014
  • =='''Vulnerability Management Standard'''== ...jectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • =='''Sample Management Security Awareness Standard'''== ...ts for providing security awareness education and training for the Company management.<br> ...
    6 KB (752 words) - 14:02, 1 May 2010
  • Click [[File:Records-Management.pdf]] for more information. ...
    299 bytes (39 words) - 22:00, 15 March 2010
  • ==Sample Asset Management Standard== ...ard defines Company objectives for establishing specific standards for the management of the networks, systems, and applications that store, process and transmit ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ...rily out of [[ISO/IEC 17799]], a code of practice for information security management published by the [[International Organization for Standardization]] in 2000 ...can be used as a template to make ISO 9001 compliant information security management systems. While ISO 27001 is controls based, ISM3 is process based. ISM3 has ...
    2 KB (257 words) - 17:09, 22 March 2007
  • ...covered that with an organized, systematic approach, you can approach risk management effectively. Risk simply put is the negative impact to business assets by t ...lping you understanding the core elements of a successful IT security risk management program for a commercial enterprise, the processes of calculating the cost ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • =='''Sample Life Cycle Management Standard'''== ...Name>''' (the "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for prop ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • =='''Sample Management Security Awareness Standard'''== ...ts for providing security awareness education and training for the Company management.<br> ...
    5 KB (662 words) - 17:54, 25 July 2006
  • ==Sample Vulnerability Assessment and Management Standard== ...ectives for establishing specific standards for the assessment and ongoing management of vulnerabilities. ...
    2 KB (230 words) - 19:16, 14 January 2014
  • ...done on time and on budget, you know it can be a challenge. Learn project management practices that make the e-Discovery process easier. You’ll improve planning ...
    402 bytes (59 words) - 10:44, 16 March 2010

Page text matches

  • ==Capacity Management== ...agement, Modeling, Capacity Planning, Resource Management, and Performance Management. ...
    352 bytes (43 words) - 15:46, 20 March 2007
  • ==IT Service Continuity Management== ...[[Contingency Plan Testing]], and [[Risk_Assessment_and_Treatment: | Risk Management]]. ...
    464 bytes (58 words) - 13:24, 30 April 2007
  • ==Service Level Management== ...l processes to control their activities. The central role of Service Level Management makes it the natural place for metrics to be established and monitored agai ...
    2 KB (253 words) - 15:44, 20 March 2007
  • ==Sample Vulnerability Assessment and Management Standard== ...ectives for establishing specific standards for the assessment and ongoing management of vulnerabilities. ...
    2 KB (230 words) - 19:16, 14 January 2014
  • Provides a framework for consistent, timely, and cost-effective management decisions.<br> Management best guesses.<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • Provides a framework for consistent, timely, and cost-effective management decisions.<br> Management best guesses.<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • ==Change Management== ...anges (fixes) - with minimum risk to IT infrastructure. The goal of Change Management is to ensure that standardized methods and procedures are used for efficien ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ...g to a business and service priority and routed to the appropriate problem management team, and customers kept informed of the status of their queries. ITIL Incident Management<br> ...
    2 KB (299 words) - 17:41, 5 May 2006
  • ...rily out of [[ISO/IEC 17799]], a code of practice for information security management published by the [[International Organization for Standardization]] in 2000 ...can be used as a template to make ISO 9001 compliant information security management systems. While ISO 27001 is controls based, ISM3 is process based. ISM3 has ...
    2 KB (257 words) - 17:09, 22 March 2007
  • ...issues are recorded, analyzed, resolved in a timely manner and reported to management. . ...if a problem management system exists and how it is being used. Review how management has documented how the system is to be used. ...
    2 KB (325 words) - 19:12, 25 June 2006
  • Management should establish quality assurance procedures and update future planning wi Management should conduct quality assurance reviews for all significant activities bot ...
    2 KB (227 words) - 18:59, 17 April 2007
  • ==Sample Asset Management Standard== ...ard defines Company objectives for establishing specific standards for the management of the networks, systems, and applications that store, process and transmit ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ==Availability Management== Availability Management allows organizations to sustain the IT service availability in order to sup ...
    1 KB (154 words) - 15:48, 20 March 2007
  • ITIL Security Management, Security Management Measures<br> ITIL 4.2 Implement Security Management, Security Management Measures<br> ...
    2 KB (270 words) - 14:54, 5 May 2006
  • ==Service Desk Management== A '''Service Desk''' is a primary IT capability called for in IT Service Management (ITSM) as defined by the [[Information Technology Infrastructure Library]] ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ...sourced services is performed in accordance with the organization’s vendor management policy.<br> ...sourced services is performed in accordance with the organization’s vendor management policy. .<br> ...
    2 KB (306 words) - 18:32, 14 June 2006
  • ...sourced services is performed in accordance with the organization's vendor management policy.<br> ...nagement policy and discuss with those responsible for third-party service management if they follow such standards. ...
    2 KB (295 words) - 15:40, 25 June 2006
  • '''PO 9.1 IT and Business Risk Management Alignment'''<br> ...nagement and control framework with the organization’s (enterprise’s) risk management framework. This includes alignment with the organization’s risk appetite an ...
    3 KB (377 words) - 14:10, 8 August 2006
  • =='''Asset Management'''== ...mation security perspective is not just about 'IT' Assets. It is about the management, control and protection of '''all''' aspects of Information / Data in whate ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ==Problem Management== The goal of Problem Management is to resolve the root cause of incidents and thus to minimize the adverse ...
    3 KB (480 words) - 16:20, 20 March 2007
  • =='''Sample Management Security Awareness Standard'''== ...ts for providing security awareness education and training for the Company management.<br> ...
    5 KB (662 words) - 17:54, 25 July 2006
  • '''DS 5.1 Management of IT Security'''<br> Manage IT security at the highest appropriate organizational level, so the management of security actions is in line with business requirements. ...
    3 KB (394 words) - 17:12, 22 March 2007
  • :[[Sample Asset Management Policy:|'''Sample Asset Management Policy''']]<br> :The Asset Management Policy defines objectives for properly managing Information Technology infr ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...01: "Information technology - Security techniques - [[Information Security Management System]]s" are of particular interest to information security professionals ...s standards and guidelines to increase secure IT planning, implementation, management and operation. NIST is also the custodian of the USA [http://csrc.nist.go ...
    2 KB (287 words) - 14:29, 8 March 2007
  • ==Release Management== ...ntation of new hardware and software is also the responsibility of Release Management. This guarantees that all software can be conceptually optimized to meet th ...
    2 KB (352 words) - 16:42, 20 March 2007
  • :::a. SOX.2.0.1: Organizational policies and management procedures are in place to ensure the IT function is controlled properly.<b ITIL ICT Infrastructure Management.<br> ...
    3 KB (356 words) - 17:11, 1 May 2006
  • ...ves, or from programs, projects or service improvement initiatives. Change Management can ensure standardized methods, processes and procedures are used for all ==Change management in development projects== ...
    4 KB (523 words) - 10:24, 23 April 2010
  • [[DS1.1:| 1.1 Service Level Management Framework]]<br> [[DS2.2:| 2.2 Supplier Relationship Management]]<br> ...
    4 KB (538 words) - 19:08, 14 June 2007
  • ==IT Management Booklet== ...risk management processes to ensure effective information technology (IT) management.<br> ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ...upport the objectives established in the Asset Protection Policy and Asset Management Policy.<br> :1. [[Sample Life Cycle Management Standard:|'''Sample ISO Life Cycle Management Standard''']]<br> ...
    5 KB (613 words) - 18:14, 25 July 2006
  • The problem management system should provide for adequate audit trail facilities that allow tracki ...rs on user services. In the event that this impact becomes severe, problem management should escalate the problem, perhaps referring it to an appropriate board t ...
    3 KB (451 words) - 17:52, 5 May 2006
  • ...nal standard for [[Compliance#ITIL_IT_Infrastructure_Library: | IT Service Management]]. It was developed in 2005, by the BSI Group. It is based on and intended ...ogether, these form a top-down framework to define the features of service management processes that are essential for the delivery of high quality services.<br> ...
    2 KB (298 words) - 14:25, 23 April 2010
  • [[Asset Management:|'''Asset Management''']]<br> [[Communications and Operations Management:|'''Communications and Operations Management''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as ...
    6 KB (885 words) - 10:12, 23 March 2007
  • ...nd services. The framework should integrate with the corporate performance management system.<br> ...
    2 KB (301 words) - 12:27, 4 May 2006
  • ...c level to deal with related security issues. Obtain direction from senior management on the appetite for IT risk and approval of any residual IT risks.<br> ITIL ICT Infrastructure Management, Design and Planning.<br> ...
    3 KB (370 words) - 18:04, 1 May 2006
  • ...rs, risk managers, the corporate compliance group, outsourcers and offsite management.<br> ITIL 7. Supplier Relationship Management.<br> ...
    2 KB (342 words) - 18:20, 1 May 2006
  • ==Configuration Management== ...an '''Information Technology Infrastructure Library''' [[ITIL]] IT Service Management [[ITSM]] '''process''' that tracks all of the individual Configuration Item ...
    4 KB (570 words) - 16:12, 23 March 2007
  • ...t and disposition of records under chapters 29, 31, or 33 of title 44, the management of information resources under sub-chapter I of chapter 35 of this title, o ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • '''PO 10.2 Project Management Framework'''<br> ...should be integrated with the enterprise portfolio management and program management processes.<br> ...
    3 KB (367 words) - 16:28, 21 June 2006
  • ==Configuration Management == ...re or software upgrade, a computer technician can access the configuration management program and database to see what is currently installed. The technician can ...
    7 KB (942 words) - 15:09, 23 March 2007
  • :'''Assign to an individual or team the following information security management responsibilities:'''<br> ...rity to a Chief Security Officer or other security-knowledgeable member of management. Obtain information security policies and procedures to verify that the fol ...
    2 KB (293 words) - 16:04, 2 March 2007
  • ...is standardized, logged, approved, documented and subject to formal change management procedures. ...xists and is maintained to reflect the current process. Consider if change management procedures exist for all changes to the production environment, including p ...
    3 KB (447 words) - 13:36, 23 June 2006
  • '''ME 4.5 Risk Management'''<br> ...s and report IT-related risks and the impact on the business. Make sure IT management follows up on risk exposures, paying special attention to IT control failur ...
    2 KB (334 words) - 13:36, 4 May 2006
  • :'''Assign to an individual or team the following information security management responsibilities:'''<br> ...rity to a Chief Security Officer or other security-knowledgeable member of management. Obtain information security policies and procedures to verify that the fol ...
    2 KB (303 words) - 16:00, 2 March 2007
  • '''DS 10.4 Integration of Change, Configuration and Problem Management '''<br> ...ents, integrate the related processes of change, configuration and problem management. Monitor how much effort is applied to firefighting rather than enabling bu ...
    2 KB (248 words) - 17:50, 5 May 2006
  • ...y policy exists and has been approved by an appropriate level of executive management. ...been approved by an appropriate level of senior management to demonstrate management’s commitment to security? ...
    3 KB (351 words) - 16:49, 25 June 2006
  • ...t and disposition of records under chapters 29, 31, or 33 of title 44, the management of information resources under sub-chapter I of chapter 35 of this title, o ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • ITIL Service Delivery, IT Service Continuity Management.<br> ITIL 7.5 Risk assessment model ICT Infrastructure Management, Annex 3B.<br> ...
    2 KB (317 words) - 20:10, 1 May 2006
  • :::a. SOX.2.0.1: Organizational policies and management procedures are in place to ensure the IT function is controlled properly.<b ITIL 8. Roles, Responsibilities and Interfaces Application Management.<br> ...
    3 KB (393 words) - 17:18, 1 May 2006
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)