Test 2 Study Guide Flashcards
What are the five factors that play into maturity for an IT Function?
The five main factors that contribute to the maturity of an IT function are:
- Uniqueness
- Commonality
- Standardization
- Commoditization
- Like a Utility
What does it mean for an IT function to be unique?
A unique IT function is one that provides strategic advantages and benefits, and might even be proprietary.
What does it mean for an IT function to be common?
A common IT function plays to common organizational needs. It doesn’t do much to help the business stand apart from competition, but it’s necessary.
What does it mean for an IT function to be standardized?
A standardize IT function is one that not only provides common tasks and activities, but also sticks to an external standard.
What does it mean for an IT function to be commoditized?
A commoditized IT function is one that is considered in the same light as regular commodities are, such as network services, backup services, storage capacity, etc.
What does it mean for an IT function to be like a utility?
An IT function that is treated like a commodity, but is delivered by a centralized and consolidated source.
What are the four key IT sourcing options?
The four key IT sourcing options are:
- In-House
- Insource
- Outsource
- Partnership
Define Insourcing
Insourcing is the opposite of outsourcing. It’s when a company announces that it’s done with contracting out a business function and is going to do it internally.
It can also be defined as bringing a third-party employee to work inside a company’s facility.
What is the difference between outsourcing and offshoring?
Outsourcing is moving a business function to a contract agency. Offshoring is moving it abroad.
What does in-house sourcing entail?
In-house sourcing is when a company performs an activity or operation within itself, instead of outsourcing.
What are the four criteria to take into account when deciding what sourcing method to take?
The four criteria for selecting sourcing are:
- Flexibility
- Control
- Knowledge Enhancement
- Business Exigency
What does flexibility mean in terms of sourcing?
Flexibility in sourcing refers to the speed at which a function can be delivered, and the range of what can be delivered.
What does control mean in terms of sourcing?
Control, in terms of sourcing, refers to how well delivered results meet requirements, and how secure intellectual assets are.
What does knowledge enhancement mean in terms of sourcing?
In sourcing, knowledge enhancement refers to the amount of work it will take to capture and train the necessary knowledge to perform the function.
What does business exigency mean in terms of sourcing?
In sourcing, business exigency refers to the ability to respond to unforeseen crises or opportunities.
What are the five components of a properly thought-out sourcing strategy?
The five components of a well-thought-out sourcing strategy are:
- Identify your core IT functions
- Create a function sourcing profile
- Evolve full-time IT personnel
- Encourage exploration of all sourcing options
- Combine sourcing options if beneficial
What is a sourcing strategy?
A sourcing strategy is basically a way to determine what IT functions are core to the business and shouldn’t be trusted to be outsourced.
What is a risk mitigation strategy in regards to sourcing?
A risk mitigation strategy is a way that, when considering sourcing, you find a way to share the risk between both yourself and your vendor, so both parties have incentive to perform.
Why is it important to understand cost structures?
It is important to understand cost structures when making sourcing decisions so that you can make ongoing cost comparisons, which is a motivator.
What is the historical view of IT-based risk? How has it changed?
The historical view of IT-based risk is one of a low-risk field, focused on delivering projects and keeping apps running. Today, IT-based risk is complex and broad, and is a central part of any tech-based work.
What are the three main effects of IT risk incidents ?
The three main effects of IT risk incidents are:
- Harm to constituencies both inside and outside of companies.
- Damage to corporate reputations
- Dampening of an organization’s competitive ability.
Where do external IT risks primarily come from?
External IT risks primarily come from three areas:
- Third parties, such as partners, vendors, etc
- Hazards, like disasters or political upheaval
- Legal or regulatory issues, and failure to comply with law
Where do internal IT risks primarily come from?
Internal IT risks primarily come from five areas:
- Information - Privacy, quality, etc.
- People
- Cultural - Risk aversion vs. Risk Awareness
- Control
- Governance
Where do criminal IT risks primarily come from?
IT criminal risks primarily come from:
- Viruses
- Hackers
- Organized Crime
- International Spies
- Terrorists
What are the three factors of holistic risk management?
In holistic risk management, there are three factors:
- Focusing on What’s Important
- Expecting Changes Over Time
- View Risks from Multiple Levels & Perspectives
What does it mean in risk management to “focus on what’s important”?
Focusing on what’s important in risk management means to not try and anticipate all risks, but to reduce significant ones so they’re manageable. Risk management is about accepting risk properly.
What does it mean in risk management to “expect changes over time”?
Expecting changes over time in Risk Management involves understanding that risk management is a continuous process, with mandatory and regular risk assessments.
What does it mean in risk management to “view risks from multiple levels & perspectives”?
Viewing risks from multiple levels & perspectives in risk management refers to doing a root-cause analysis of any incidents, shoring up the walls, so to speak, and refining understanding. Risk, security, and compliance are not the same thing, and should be seen as individual topics.
What is the goal of a risk management framework?
A risk management framework is designed to ensure that the right risks are being addressed at the right levels. It guides the development of risk policies and standards.
What are the main components of a risk management framework?
There are six components to a risk management framework:
- Risk Category
- Risk Ownership
- Risk Type
- Risk Reporting & Monitoring
- Risk Mitigation
- Policies and Standards
What is risk category, in reference to a risk management framework?
Risk category, in a risk management framework, is the general area of enterprise risk, such as criminal, operations, etc.
What are policies and standards, in regards to a risk management framework?
Policies and standards in a risk management framework are the standards and principles that guide risk decision making.