Question

In: Computer Science

Application Security & Backup/Recovery Looking at the Cherwell software. 3.5.1. In respect to recovery, is there...

Application Security & Backup/Recovery

Looking at the Cherwell software.

3.5.1. In respect to recovery, is there is a time objective for restoring the system after a disruption?

3.5.2. Is there a service level objective when restoring the system?

3.5.3. Is there a certain amount of data (like 3 hours or days of transactions) that can be considered an acceptable (tolerable) interim loss from a disruption to the system?

Solutions

Expert Solution

In respect to recovery, there is a purpose of the Incident Management process which is to restore normal service operation as quickly as possible and minimize the adverse impact on business operations, ensuring that agreed levels of service quality are maintained.

The primary goal of Problem Management is to minimize the impact of Problems on the business and prevent recurrence. When successful, downtime and disruptions are reduced. Additional benefits include:

  • Increased service availability
  • Improved service quality
  • Decreased Problem resolution time
  • Reduction of the number of Incidents
  • Increased productivity
  • Reduced costs
  • Improved customer satisfaction

2. In the service desk owns the Incident Management process and is responsible for resolving incidents according to service level agreements with the goal of restoring services as quickly as possible and getting the customer back to work. ITIL service desk responsibilities that are associated with Incident Management include:

  • Incident Management Support - Service desk managers must ensure that adequate tools, processes, and skills are maintained throughout the service desk team to ensure the timely and effective handling of incidents.
  • Incident Logging and Categorization - Service desk analysts are expected to keep an accurate and up-to-date log of each incident that is reported, including the category/type of incident. Incidents need to be organized and prioritized based on the level of disruption that they cause.
  • Incident Resolution - Service desk analysts typically play the role of 1st-level support within the IT organization—they're the ones that answer the phone or respond to your message when you first contact IT, and their goal is always to resolve the incident on the first call and restore service as quickly as possible
  • Handling of Major Incidents - Some incidents are classified as major incidents, meaning that they cause a massive business interruption and need to be fixed immediately.
  • Incident Management Reporting - If your organization has an established Problem Management process, most of the information you receive about problems will come through the service desk.

3. There is a certain amount of data that can be considered an acceptable (tolerable) interim loss from a disruption to the system and the advantage of this is the ITIL service operations processes such as Incident Management, Problem Management, and Request Fulfillment, and leverage key ITIL service transition processes including Change, Configuration, and Release and Deployment Management.


Related Solutions

Explain how you will test your backup and recovery strategy. Continuity of operation Exercises After-action reports...
Explain how you will test your backup and recovery strategy. Continuity of operation Exercises After-action reports Failover Alternate processing sites Alternate business practices
Q4. Out of three levels of security I.e. Infrastructure security, Application security and Operational security, we...
Q4. Out of three levels of security I.e. Infrastructure security, Application security and Operational security, we can only deal with application security. Although it is the area we work on, but overall security of even our application depends upon the organizational security policies. Do you agree? Comment using an example. Q5. There are 4 types of security threats namely, Interception, interruption, modification and fabrication. As a software programmer, what threat is the one you may work to avoid and how?...
Security Software Architecture Performance Software Architecture Information Architecture Records Management
 Security Software Architecture Performance Software Architecture Information Architecture Records Management
The first step in writing a software application is to determine the requirements. There is no...
The first step in writing a software application is to determine the requirements. There is no value in writing a program that does not address the needs of the client. Requirements can be gathered in many ways, but ultimately, the requirements serve to document what the application should and should not do. After the requirements are written, the application design can be prepared, followed by the actual coding. For this project, you will gain some practice in the design phase...
What is the difference between the application of Teamcenter and Technomatix software?
What is the difference between the application of Teamcenter and Technomatix software?
If you were in charge of Information Security for a financial services company how would you design the backup strategy?
If you were in charge of Information Security for a financial services company how would you design the backup strategy? Include a diagram to document your backup strategy. Include recovery steps in your diagram.
Your software development company wants to continue developing and enhancing a software application for internal use....
Your software development company wants to continue developing and enhancing a software application for internal use. For this week's assignment, the application is required to read from a file (data.txt) containing employee data. Your tasks include: Use the data file from Week One (data.txt) Implement LINQ functionalities to search, display, and modify employees' records Meet specifications by displaying on a Windows Form Application Program Input File: Using Visual Studio and C# programming concepts and using your Week one data.txt file...
Define and discuss Web Site Security and also Define and discuss Web Application Security.
Define and discuss Web Site Security and also Define and discuss Web Application Security.
3.6 Contrasting and explaining general application concepts and uses Single-platform software Cross-platform software Licensing Software installation...
3.6 Contrasting and explaining general application concepts and uses Single-platform software Cross-platform software Licensing Software installation best practices 4.1 Comparing and contrasting programming language categories Interpreted Compiled programming languages Query languages Assembly language
Discuss the use of technologies and security impacts of New Ways of Work with respect to...
Discuss the use of technologies and security impacts of New Ways of Work with respect to COVID-19.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT