Friday 20 December 2019

International IT Management Models and Standards

International IT Management Models and Standards

This chapter briefly describes the international IT management models and standards applied in the development of the IT Standard.



ITIL

CMMI

COBIT

PMBOK

PRINCE2

ISO/IEC 20000

ISO 21500

ISO/IEC 38500

TOGAF





ITIL

ITIL, formerly known as Information Technology Infrastructure Library, is a set of guidelines and best practices for IT service management (ITSM). It is a registered trade mark of AXELOS Limited. ITIL focuses on aligning IT services to the needs of business and supports its core processes. It is structured and published in five core volumes: Service Strategy, Service Design, Service Transition, Service Operation and Continual Service Improvement.



The framework that ITIL provides can be adapted and applied to all business and organizational environments. It includes guidance for identifying, planning, delivering, and supporting IT services. When successfully adopted, ITIL can help improve services, which in turn can mitigate business risks and service disruption, improve customer relationship, and establish cost-effective systems for managing demands for services.







CMMI

CMMI®, Capability Maturity Model® Integration, is an internationally known reference model developed through best practices that provide guidance for improving processes that meet the business goals of an organization. It was developed by industry experts, governments, and the Software Engineering Institute (SEI).



CMMI improves processes for an organization to show measurable benefits for their business objectives and vision. An organization can organize and prioritize its methodologies, people, and business activities through the framework provided by CMMI. The framework supports coordination of multi-disciplinary activities and systematic thinking.







COBIT

COBIT 5 (launched in 2012), The Control Objectives for Information and Related Technology, is owned and supported by ISACA. It was originally released in 1996 as COBIT. The current version 5.0 consist of COBIT 4.1, VAL IT 2.0, and Risk IT frameworks.



COBIT 5 helps to create optimal value using IT by maintaining a balance among benefit realization, risk optimization, and resource usage. The framework covers both business and IT units in the whole organisation. It provides metrics and maturity models to measure whether or not the IT organization has achieved its objectives. In addition, it also balances the needs of internal and external stakeholders.







PMBOK

PMBOK, a Guide to the Project Management Body of Knowledge, is a guide to the internationally recognized project management methods by the Project Management Institute (PMI). PMBOK is a standard that is widely accepted and acknowledged as basis for most project management methods.



PMBOK provides an in-depth description of the required content and fundamentals of a project, but does not focus on giving hands-on implementation advice. Practical guidance is offered by other models such as PRINCE2. It is based on five basic processes: Initiating, Planning, Executing, Controlling and Monitoring, and Closing.







PRINCE2

PRINCE2, Projects IN a Controlled Environment, is a de facto standard project management method owned by the UK Cabinet Office. PRINCE2 complements the PMBOK model by providing a process-based and practical guidance with ready-to-use templates for Project Managers and Project Steering Groups in the different phases of a project. PRINCE2 ensures greater control of resources and effective management of business and project risks.



For example, the seven principles of PRINCE2 state how a project should be run throughout its life-cycle: a project must have a business justification, clearly defined roles and responsibilities in all phases and processes, managed by stages to provide detailed and timely planning, defined tolerances for management by exception, product focused delivery where project methods are tailored to fit this particular project’s needs, and learning from experience to continuously improve organization’s project culture.







ISO/IEC 20000

ISO/IEC 20000 is a service management system (SMS) and the first international standard for IT service management. It is owned by The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). It is broadly aligned with ITIL.



The ISO/IEC 20000 has two parts. The first part defines the formal requirements for high-quality production of IT services to the business. IT includes criteria for planning, service management, and service production as well as for customer / supplier management. The second part describes the processes of service production largely in the same way as the ITIL processes while focusing, however, more closely on customer/supplier management processes.



ISO 21500

ISO 21500 is a standard that provides “generic guidance on the concepts and projects of project management” which are important in the realization of successful projects. It can be used by any type of organization and applied to any type of project – irrespective of size, complexity or duration.



ISO 21500 is an informative standard, that is rather a general guideline than a certified methodology. It provides high-level description of concepts and processes that are considered to form good practice in project management and places projects in the context of programs and project portfolios. PMBOK is very much in line with ISO 21500 and vice versa.



ISO/IEC 38500

ISO/IEC 38500 is a standard providing general principles on the role and IT governance of management with business responsibility (for example, Board of Directors and Management Team). It can be widely applied to all kinds and sizes of organizations for example public and private companies and non-profit organizations.



The standard supports business management in their supervision of the IT organization and helps them ensure that IT has a positive impact on the company’s performance. The standard consist of six principles:



Responsibility

Strategy

Acquisition

Performance

Conformance

Human behaviour

Adherence to the ISO/IEC 38500 standard can assure management of conformance with good governance







TOGAF

TOGAF is an Open Group Standard enterprise architecture framework that allows organizations to have a structured approach for governing the implementation of technology, in particular the software technology design, development, and maintenance. It was first published in 1995 and was based on the US Department of Defence Technical Architecture Framework for Information Management (TAFIM). It has been since developed by The Open Group Architecture Forum and released in regular intervals on the Open Group public website.



TOGAF improves business efficiency by ensuring consistent methods, communication, and efficient usage of resources. It ensures industry credibility with a common language among enterprise architecture professionals.


Courtesy:
https://www.itforbusiness.org/book/ict-standard-tools-and-deployment/international-it-management-models-and-standards/

ISO 27001


Posted by: Margaret Rouse
WhatIs.com

https://whatis.techtarget.com/definition/ISO-27001
 

What is ISO 27001?

ISO 27001 (formally known as ISO/IEC 27001:2005) is a specification for an information security management system (ISMS). An ISMS is a framework of policies and procedures that includes all legal, physical and technical controls involved in an organisation's information risk management processes.


According to its documentation, ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system."

ISO 27001 uses a topdown, risk-based approach and is technology-neutral. The specification defines a six-part planning process:

Define a security policy.
Define the scope of the ISMS.
Conduct a risk assessment.
Manage identified risks.
Select control objectives and controls to be implemented.
Prepare a statement of applicability.
The specification includes details for documentation, management responsibility, internal audits, continual improvement, and corrective and preventive action. The standard requires cooperation among all sections of an organisation.

The 27001 standard does not mandate specific information security controls, but it provides a checklist of controls that should be considered in the accompanying code of practice, ISO/IEC 27002:2005. This second standard describes a comprehensive set of information security control objectives and a set of generally accepted good practice security controls.

ISO 27002 contains 12 main sections:

1. Risk assessment
2. Security policy
3. Organization of information security
4. Asset management
5. Human resources security
6. Physical and environmental security
7. Communications and operations management
8. Access control
9. Information systems acquisition, development and maintenance
10. Information security incident management
11. Business continuity management
12. Compliance

Organisations are required to apply these controls appropriately in line with their specific risks. Third-party accredited certification is recommended for ISO 27001 conformance.

Other standards being developed in the 27000 family are:

27003 – implementation guidance.
27004 - an information security management measurement standard suggesting metrics to help improve the effectiveness of an ISMS.
27005 – an information security risk management standard. (Published in 2008)
27006 - a guide to the certification or registration process for accredited ISMS certification or registration bodies. (Published in 2007)
27007 – ISMS auditing guideline.

Wednesday 4 December 2019

Configuring CISCO Router 1841

enable
config t
hostname Router0
enable secret class
line con 0
password cisco
login
exit
line vty 0 4
password cisco
login
exit
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
description Router0 FastEthernet0/0
no shutdown
exit


interface FastEthernet0/1
ip address 192.168.2.1 255.255.255.0
description Router0 FastEthernet0/1
no shutdown
exit
exit
show running-config

click enter..enter to see the report
copy running-config startup-config

Basics of Networking - Cisco Packet tracer & Wire Shark

Basics of Networking - You can't proceed without these...





Use the link below to Sign-up and download Cisco Packet Tracer software.


Wednesday 27 November 2019

Tech Training - basics topic for presentation.

S.No
Topic
Category
1
Computer Basics Hardware
Components of Hardware
Computer Basics
2
Software and Firmware
Operating System
Operating System-functions and its types(CUI and GUI)
Computer Basics
3
Brief introduction to Windows operating system Introduction to Macintosh operating systems
Computer Basics
4
How to find the operating system version in Windows and Mac OS
Computer Basics
5
End the programs that are not responding using the Task manager Safe mode
Computer Basics
6
Information Technology International Standards
Computer Basics
7
Browsers, application & settings (home page, downloads, extensions, bookmarks)
Computer Basics
8
Browsers technical issues & troubleshooting
Computer Basics
9
Computer viruses and its implication
Computer Basics
10
Computer virus removal-Anti Virus
Computer Basics
11
Computer etiquette & maintenance
Computer Basics
12
Windows Installation & common errors & troubleshooting
Computer Basics
13
Windows shortcut keys
Computer Basics
14
MAC address-how to find Mac address in all windows and Mac OS
Computer Basics
15
Expansion slots - PCI, PCI-X, PCI Express and PCMCIA
Hardware
16
Ports - serial, Parallel and USB Ports NIC and its types
Hardware
17
NIC Installation- step by step for Windows
Hardware
18
How to check whether the device is installed properly in the Device manager
Hardware
19
Device manager-symbols, error codes, uninstall and update drivers
Hardware
20
Basic Troubleshooting with respect to NIC installation
Hardware
21
Different kinds of computer Cables & their uses
Hardware
22
Services-Starting and stopping a service with reference to WZC and WLAN Autoconfig
Networking
23
What is networking? Classification of networks-based on scale (LAN, MAN, WAN) and relationship between comp client server and peer to peer
Networking
24
Topology- With special reference to Star
Networking
25
Types of Communication-Unicast,multicast,broadcast
Networking
26
Transmission media-coaxial, twisted pair-straight through and cross over cable MDI and MDIX,Connectors-RJ11 and RJ 45
Networking
27
Test 1-Basic Hardware and Operating Systems
Networking
28
OSI Model- function of each layer, protocols, data units and devices
Networking
29
Introduction to IP address -Subnet mask and its importance Different classes of ip address, number of networks and hosts of each class
Networking
30
Classification of IP address-Public, Private and APIPA
Networking
31
How to find IP address in all windows and Mac OS
Networking
32
Different ways in a computer can get an IP address- Static and Dynamic How to assign static ip address in all OS?
Networking
33
Releasing and renewing an ip address, error while release a static ip address DHCP-DORA process
Networking
34
RJ 45 wire crimping
Networking
35
Networking Basics Continued... Importance of PING and PING status messages in networking- RTO, DHU, DNU, unknown host, error code 65
Network Commands and Troubleshoot
36
DNS- Forward look up and reverse lookup-
Network Commands and Troubleshoot
37
Continuous PING and Trace routeHow to check DNS functionality- nslookup
Network Commands and Troubleshoot
38
Troubleshoot DNS issues
Network Commands and Troubleshoot
39
Link speed and its importance-Auto negotiation
Network Commands and Troubleshoot
40
Change duplex settings-All windows OS
Network Commands and Troubleshoot
41
Networking devices- Repeaters, Hub, Switch, Bridge, Router, Gateway Cascading Hubs and Switches
Networking Devices
42
PAT and the basic functionality of a PAT Firewall and its types-SPI
Networking Devices
43
Disabling the inbuilt firewall (Xp, Vista) and any third party firewall Types of internet connection and their key differences-Dialup, DSL and Cable
Networking Devices
44
Different modes in which a DSL modem can function- NAT and Bridge Configuring a SOHO router for cable, DSL (NAT and Bridge) and Static IP connections
Networking Devices
45
Basic troubleshooting Direct Connection issues
Trouble shooting
46
Windows IP configuration, Media state media disconnected, 169.254.x.x
Trouble shooting
47
Unable to PING the router, unable to open the route set up page, no WAN IP
Trouble shooting
48
Getting a WAN IP but unable to go online Cascading routers (LAN to LAN and LAN to WAN) Revision
Trouble shooting
49
Introduction to Wireless networks and different types of wireless transmissions
Wireless Networking
50
Difference between wired and wireless networks
Wireless Networking
51
Advantages and disadvantages of using Radio Frequency for wireless transmission
Wireless Networking
52
ISM bands and channel designing IEEE 802.11 standards along with their specifications and interoperability
Wireless Networking
53
Dual Band Technology Part 1 & Part 2
Wireless Networking
54
Wireless modes- Ad hoc and infrastructure
Wireless Networking
55
SSID and its importance
Wireless Networking
56
Different ways of securing a wireless network:- WEP, WPA and Wireless MAC filter Installation of wireless adapters
Wireless Networking
57
Difference between a wired router and wireless router
Wireless Networking
58
Configuring a Wireless Router
Wireless Networking
59
Different stages involved in connecting to a wireless network:- Scanning, Authentication and Association
Wireless Networking
60
Scanning and connecting to wireless network using WZC and WLAN Autoconfig
Wireless Networking
61
Configuring wireless clients in an Ad hoc mode
Wireless Networking
62
Fundamental troubleshooting steps in wireless
Wireless Networking
63
Access Point- Difference between a wireless router and an access point
Wireless Networking
64
Configuring and connecting an access point to an existing wired network
Wireless Networking
65
WDS: Different modes in access points Wireless bridging
Wireless Networking