Professional IT
Perspective:
IT Toolkit
Bradley Shedd
IT 7833
April 29, 2013
• My perspective outlook on an IT professional is to view them as information gatherers. The IT professional can build, program, and manage computer systems. There is always a need for technology to fix problems that cannot be mended with other resources. The IT professional is available to manage the situation by using policies, strategies and
governance. Each IT professional will continually follow a trail of reaching a better understanding of becoming an IT
computer guru. According to Wikipedia, you can have a chartered IT professional certification that can be earned and accredited through the British Computer Society. You can be an IT professional if you work in an environment that uses your computer skills to help others in the working world. However, nobody can ever become a complete computer guru and know everything about computers.
The IT Professional
• According to the University of California in Santa Cruz, policy is
used to define how employees, staff and students are to approach
security (Information Technology Services, 2012).
The Control Objectives for Information and Related Technology (COBIT) states that policy is to follow a set of security guidelines that are to control companies’ set objectives. COBIT is a framework created by Information Systems Audit and Control Association (ISACA) for information technology (IT) management and IT governance (COBIT, 2013).
IT Policy
Define and maintain an overall IT
security plan that includes:
A complete set of security policies and standards in line with the established information security policy framework
Procedures to implement and enforce the policies and standards
Roles and responsibilities
Staffing requirements
Security awareness and training
Enforcement practices
Investments in required security resources
Scope and objectives of the security management function
Responsibilities of the security management function
Compliance and risk drivers
Security compliance policy
Management risk acceptance (security non-compliance acknowledgement)
External communications security policy
Firewall policy
E-mail security policy
An agreement to comply with IS
policies
Laptop/desktop computer security policy
Internet usage policy
Ensure system security
Manage the configuration, data, third- parties, operations, and problems or incidents.
Install and accredit solutions and changes
End-user computing
IT Policy Guidelines
IT strategy is defined as “the overall plan which consists of
objectives, principles and tactics relating to the use of the
technologies within a particular organization” (Technology
Strategy, 2013). “Such strategies primarily focus on the
technologies themselves and in some cases the people who
directly manage those strategies” (IT Strategy, 2013).
• “Such strategies primarily focus on the technologies themselves and in some cases the people who directly manage those strategies”.
IT Strategy
Plan and Organize
This domain provides directions to solutions’ delivery and service delivery
Define a Strategic IT Plan and
Direction
Define the Information
Architecture
Determine Technological
Direction
Define the IT Processes, Organization and Relationships
Manage the IT Investment
Communicate Management
Aims and Direction
Manage IT Human Resources
Manage Quality
Assess and Manage IT Risks
Manage Projects
Acquire and Implement
(AI)
This domain provides the solutions and passes them on to be turned into services in the next domain.
Identify Automated
Solutions
Acquire and Maintain
Application Software
Acquire and Maintain
Technology Infrastructure
Enable Operation and Use
Procure IT Resources
Manage Changes
Install and Accredit
Solutions and Changes
Strategy Guidelines
• According to Weill and Ross IT governance
focuses on specifying the rights and
accountability to encourage desirable behavior
in the use of IT.
• IT governance is a subset of discipline of corporate governance focused on IT systems and their performance and risk management (Information Technology Governance, 2013).
IT Governance
Deliver and Support
This domain receives the solutions and makes them usable for end users.
Manage Service Levels
Manage Third-party Services
Manage Performance and
Capacity
Manage Service Desk and
Incidents
Manage the Configuration
Manage Problems
Manage Data
Manage the Physical
Environment
Manage Operations
Ensure Continuous Service
Ensure System Security
Identify and Allocate Costs
Educate and Train Users
Monitor and Evaluate
This domain monitors all processes to ensure that the direction provided is followed.
Monitor and Evaluate IT Processes
Monitor and Evaluate
Internal Control
Ensure Regulatory
Compliance
Provide IT Governance
IT Governance Guidelines