6: The Other Service Design Processes Flashcards
The purpose of ISM is to ensure that ___ meets the requirements of the overall ___
IT Security
Business security
Service time is the agreed ___ also known as ___
Service hours
Uptime
Availability is the ability of a service to perform its agreed ___ when ___
Function
Required
A repository for all availability management reports, plans, etc is called a ____.
This repository is apart of the___
Availability management information system
SKMS
The objectives of availability management include doing what it takes to meet ___ and ___ availability requirements
Current
Future
Downtime is an ____ to service during ___
Unplanned interruption
Service hours
What is the equation for maintainability/MTRS
Maintainability (MTRS in hours) =
Total downtime in hours
/
Number of service breaks
Low value, low risk suppliers of standard services which can be easily sourced elsewhere are ___ suppliers
Commodity
VBF stands for
Vital business function
What is the equation to calculate availability
Availability % =
Agreed Service Time (AST) - Downtime
/
AST
*100
Serviceability is the ability for a ___ to meet the ___ of its ___
3rd party supplier
Terms
Contract
The objective of ISM is to ___ the interest of those relying on information, and the systems and communications that deliver the information, from harm resulting from failures of __, ___, and ___
Protect
Confidentiality
Integrity
Availability
Resilience is the concept of having a ___ that does not result in service ___
Failure
Downtime
Middle level managers are responsible for managing relationship with ___ suppliers though regular service reviews
Tactical
Maintainability is how ___ the fault in a service can be ____
Quickly
Overcome
Information security provides the ___ for security activities
Strategic direction
Suppliers assessed as medium value and medium risk are ___ suppliers
Tactical suppliers
Resilience through redundancy is the use of one or more additional configuration items to provide ___
Fault tolerance
ISM is the identification and mitigation of ___ to the __ of the organization’s ___
Risks
Security
Information
Maintainability is measured as the ___
Mean time to restore service (MTRS)
The purpose of availability is to meet the ___ defined in the SLA
Availability requirements
ISM stands for
Information security management
Reliability is ___ a service can perform agreed function without ____
How long
Interruption
Developing a strategy for service continuity, based on this business impact analysis and the risk management actions and aligned to the business continuity strategy, is a major part of the ___ process
ITSCM process
The scope of availability management is all operational services and technology except what?
Business continuity management
IT service management
The system where information security policies are stored is the __
Security management information system (SMIS)
Suppliers with relatively low impact are ___ suppliers
Operational
Reliability is measured by this: ____
MTBF - mean (avg) time between failures
Suppliers who are assessed as high value and high risk are ___ suppliers
Strategic
Best way to categorize a supplier is based on assessing the ___ and ___ from using the supplier and the __ and ___ of its services to the business
Risk
Impact
Value
Importance
The scope of ISM includes both ___ aspects and ___ aspects
Physical aspects
Technical aspects
Relationship between the business and a strategic supplier could be coined as ___
Partnering
A _____ is a system keeps supplier policies and all information regarding suppliers and contracts
Supplier and Contract Management information system (SCMIS)
SCMIS stands for
Supplier and Contract Management information system
Supplier management is the process responsible for obtaining __ for __ from suppliers
Value
Money
Operational suppliers are managed by
Junior managers
Senior level management are responsible for __ suppliers
Strategic
Relationship with tactical suppliers involve significant ___ activity
Commercial activity
Businesses and strategic suppliers share ___ to enable long term cooperation
Confidential information
Suppliers can be categorized into what 4 categories?
Strategic
Tactical
Operational
Commodity
The information security policy should cover __ of __
All areas of security