Module 4 Part A - I.S Operations
Module 4 Part A - I.S Operations
RESILIENCE
Data Quality
3 sub-dimensions of data quality: Intrinsic, contextual and security/accessibility
i. Intrinsic –extent to which data values are in conformance with the actual or true
values i.e. accuracy, objectivity, believability, reputation.
ii. contextual –extent to which info is applicable to the task of the information user
and is presented in an intelligible and clear manner, recognizing that information
quality depends on the context of use i.e. relevancy, completeness, currency,
appropriateness, concise representation, interpretability, understandability, ease
of manipulation.
iii. security/accessibility-extent to which information is available or obtainable i.e.
availability, restricted access.
DATA MANAGEMENT
Data life cycle
A life cycle describes a series of stages that characterize the course of existence of
an organizational investment.
Data life cycle mngt describes stages that data go through in the course of existence
within an org. This includes:
Plan- creation, acquisition, use.
Design-specification of how info will look and how the system will work
Build/acquire-creation of data records, purchase of data and loading of external
files
Use/operate-store, share, use.
Monitor-ensuring that information resource works properly
Dispose-transfer or retain , destroy or archive.
DATA MANAGEMENT
I.S auditor should ensure that the:
Quality of the data allows the org to meet its strategic objectives.
Configuration of the organization’s applications and DBMS is in line with
organizational objectives.
SYSTEMS PERFORMANCE MANAGEMENT
System performance- Refers to the study of an entire sys including h/w and s/w and
how it operates.
Enterprises want to ensure that systems perform as expected and issues are
identified and addressed in a timely manner.
It is important to understand the features of IS architecture and associated s/w to aid
in the systems performance mngt process.
Reading Assignment
SOURCE CODE MANAGEMENT
Source code- the language in which a program is written.
A source code may contain intellectual property and should be protected, and
access restricted.
Organizational access to source code may differ depending on the application
and the nature of agreement with the supplier i.e.
If no source code is supplied, secure an escrow agreement
If the sw is bespoke or developed in-house , the org. will have full access to
the source code.
In all instances, source code is subject to the SDLC
The actual source code should be managed using a version control
system(VCS)- this provides the ability to synchronize source changes with
changes from other developers.
SOURCE CODE MANAGEMENT
Advantages of VCSs:
Control of source code access
Tracking of source code changes
Allowing for concurrent development
Allowing rollback to earlier versions
Allowing for branching
I.S auditor should be aware of the following:
Who has access to source code
Who can commit the code
Alignment of program source code to program objects
Alignment with change and release mngt
Backups of source code including those offsite and escrow agreements
CAPACITY MANAGEMENT
Defn: Planning and monitoring of computing and network resources to ensure that the
available resources are used efficiently and effectively.
Capacity plan should be developed based on input from user and IS mngt to ensure
that business goals are achieved in the most efficient and effective way.
Capacity planning should include projections substantiated by experience,
considering the growth of existing business and future expansions.
The following is key to the successful completion of capacity planning:
CPU utilization
Computer storage utilization
Telecommunications
LAN and WAN bandwidth utilization
I/O channel utilization
No. of users
New technologies/applications
SLAs
CAPACITY MANAGEMENT
Specialized resources of a given class may have an impact on the requirements for
other classes e.g. use of more intelligent terminals may consume less processor power
and bandwidth than other terminals.
Capacity planning defines the business’ requirements for IT capacity, in business and
technical terms, and presents the consequences of delivering the required volume of
activity through the IT infrastructure and applications.
Capacity mngt must include network devices, such as switches and routers.
Business operations and processes can only be supported reliably when IT systems
provide the required capacity.
IT capacity is expensive and orgs do not want to acquire more than what they need at
the present time.
Capacity planning ensures that the resource provision can always meet business
requirements.
With capacity mngt expensive resources are only provided when they are needed thus,
cost savings.
Capacity mngt aims to consistently provide the required IT resources at the right time
and cost and in alignment with current and future requirements of the business.
CAPACITY MANAGEMENT
Capacity planning and monitoring includes the following elements :
Development
Monitoring
Analysis
Tuning
Implementation
Modeling
Application sizing
PROBLEM AND INCIDENT MANAGEMENT
Problem mngt aims to resolve issues through investigation and in-depth
analysis of a major incident or several incidents that are similar in nature to
identify the root cause.
Standard methodologies for root cause analysis include:
Fish bone /ishikawa cause-and-effect diagrams
Brainstorming
5 whys
Problem Mngt and incident Mngt are related but have different methods and
objectives.
Problem mngt’s objective is to reduce the no and/or severity of incidents,
while;
Incident mngt’s objective is to return the affected business process back to its
normal state as quickly as possible, minimizing the impact on the business.
PROCESS OF INCIDENT HANDLING
Incident mngt focuses on providing increased continuity of service by reducing
the adverse effect of disturbances to IT services.
Incident life cycle steps:
Initiation
Classification
Assignment to specialists
Resolution
Closure
DETECTION, DOCUMENTATION, CONTROL, RESOLUTION AND
REPORTING OF ABNORMAL CONDITIONS
A mechanism should exist to detect and document any abnormal conditions that
could lead to the identification of an error.
It should not be acceptable for a problem to remain unresolved indefinitely.
The primary risk resulting from lack of attention to unresolved problems is
interruption of business operations.
i.s mngt should ensure that the problem escalation procedures are adhered to
properly.
Problem escalation procedures include:
Name/contact details of individuals who can deal with specific types of problems
Types of problems that require urgent resolution
Problems that can wait until normal working hours
SUPPORT/HELPDESK
It’s the responsibility of technical support fxn to provide specialist knowledge
of production systems to identify and assist in system change/ development
and problem resolution.
The primary purpose of helpdesk is to service the user.
NETWORK MANAGEMENT TOOLS
Patches can be ineffective and can cause problems therefore its recommended that
backups are taken and patches tested on non-critical systems prior to installations.
RELEASE MANAGEMENT
Def: It’s the process through which sw is made available to users.
The releases, whether major or minor will have a unique identity.
The releases are controlled, and, if any problems arise in the new release, one should be able
to back out completely and restore the system to its previous state.
Suitable contingency plans may also be developed before the new release is implemented.
The main roles and responsibilities shd be defined to ensure that everyone understands their
role and level of authority and those of others.
Planning a release involves:
Gain consensus on the release contents
Agree to the release strategy
Produce a high-level release schedule
Plan resource levels (including staff overtime)
Agree on roles and responsibilities
Produce back-out plans
Develop a quality plan for the release
Plan acceptance of support groups and the customer
IT SERVICE LEVEL MANAGEMENT
ITSM focuses on the business deliverables and covers infrastructure mngt of IT
applications.
It includes fine-tuning IT services to meet the changing demands of the enterprise
and measuring and demonstrating improvements in the quality of IT services
offered with a reduction in the cost of service in the long run.
IT services can be better managed with SLAs- they define the nature, type, time
and other relevant information for the services being offered.
SLAs can be supported by Operational Level Agreements (OLAs) i.e. internal
agreements covering the delivery of services that support the IT organization in its
delivery of services.
SERVICE LEVEL AGREEMENTS
An SLA is an agreement between the org. and the customer.
It describes the services in nontechnical terms from the customer’s viewpoint.
Service level mngt is the process of defining, agreeing on, documenting and
managing levels of service that are required and cost justified. It deals with more
than SLAs themselves.
The aim of service level mngt is to maintain and improve customer satisfaction and
to improve the service delivered to the customer.
Tools to monitor the efficiency and effectiveness of IT services include:
Exception reports-automated reports that identify all applications that did not
successfully complete or otherwise malfunctioned.
System and application logs-they provide additional , useful information regarding
activities performed on the computer.
Operator problem reports-manual reports used by operators to log computer
operations problems and their resolutions.
Operator work schedules-manually maintained by IS mngt to assist in human
resource planning.
MONITORING OF SERVICE LEVELS
Defined service levels must be regularly monitored to ensure that the objectives of
IS operations are achieved.
Monitoring is essential for outsourced services, particularly if third party is involved
in directly providing services to an organization’s customers.
Failure to achieve service levels will have more of an impact on the organization
than on the third party.
DATABASE MANAGEMENT
DBMS data are organized in multilevel schemes, with basic data elements, such as
fields at the lowest level.
Advantages of a DBMS include:
Data independence for application systems
Ease of support and flexibility in meeting changing data requirements
Transaction processing efficiency
Reduction of data redundancy
Ability to maximize data consistency
Ability to minimize maintenance cost through data sharing
Opportunity to enforce data/programming stds
Opportunity to enforce data security
Availability of stored data integrity checks
Facilitation of terminal users’ ad hoc access to data
DBMS ARCHITECTURE
Reading Assignment: DB Structure, DB Controls, DB reviews.