SlideShare a Scribd company logo
1 of 38
Lec-8: ITIL
Mr. Islahuddin Jalal
MS (Cyber Security) – UKM Malaysia
Research Title – 3C-CSIRT Model for Afghanistan
BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
Outlines to be discussed ……………Today
• Service Operation phase of ITIL
• Service operation purpose
• Service operation scope
• Service operation processes
• Event management
• Incident Management
• Request fulfillment Management
Service Operation
Service Operation
• Managing day-to-day activities and infrastructure
• Responsible for business-as-usual activities
• Executing processes to optimize cost and quality
• Enabling the business to meet its objectives
• Effective functioning of components
Service Operation
• Maintenance
• Management
• Realises Strategic Objectives and is where the Value is
seen
Continued….
• Service operation in neither an organizational unit nor a single
process
• But
• It include
• Several functions
• Many processes and activities
• It includes guidance on achieving effectiveness and efficiency in the
delivery and support of services so as to ensure value for the
customer and the service provider
Functions in Service Operation
• Service Desk
• Technical Management
• IT Operations Management
• Applications Management
Processes in Service Operation
• Event management
• Problem management
• Incident Management
• Request Fulfilment
• Access Management
We will discuss these
managements in detail.
Continued…
• When service interruptions do occur, service operation is charged
with restoring service as quickly as possible and with minimizing the
impact to the business
• It is the only lifecycle phase in which value is actually realized by
customers. Whereas all other phases of the Service Lifecycle
contribute to and enable value, it is only experienced during Service
Operation.
Value to the business
• Service operation is where the value is seen
• Services run within budget and ROI targets
• Design flaws fixed and unforeseen requirements satisfies
• Efficiency gains achieved
• Services optimized
Service Operation Purpose
• To coordinate and carry out the activities and processes required to
deliver and managed services within agreed parameter
• Responsible for current management of the technology
It is all about balance
• Focus
• Internal versus external
• Stability versus responsiveness
• Cost versus quality
• Reactive versus proactive7
Service Operation scope
• Includes
• Services
• Service management processes
• Infrastructure
• People
Event Management
EVENT MANAGEMENT
• Event
An alert or notification created by
• any IT Service
• Configuration Item
• monitoring tool.
• For example
• A batch job has completed. Events typically require IT Operations personnel to take actions, and
often lead to Incidents being logged.
• Event Management
The Process responsible for managing Events throughout their Lifecycle.
EVENT MANAGEMENT
• There are many different types of events:
• Events that signify regular operation
− Notification that a scheduled workload has completed
− An e-mail has reached its intended recipient
• Events that signify an exception
− A user attempts to log on to an application with the incorrect password
− A device’s CPU is above the acceptable utilization rate
• Events that signify unusual, but not exceptional, operation.
− A server’s memory utilization reaches within 5% of its highest acceptable performance level
EVENT MANAGEMENT
• Examples of event categories
• Informational
• Warning
• exceptional
Informational Event
• This refers to an event that does not require any action and does not represent an exception.
• They are typically stored in the system or service log files and kept for a predetermined period.
• Informational events are typically used to check on the status of a device or service, or to confirm
the successful completion of an activity.
• Examples of informational events include:
• A user logs onto an application
• A job in the batch queue completes successfully A device has come online
• A transaction is completed successfully.
Warning Event
• A warning is an event that is generated when a service or device is approaching a threshold.
• Warnings are intended to notify the appropriate person, process or tool so that the situation can
be checked and the appropriate action taken to prevent an exception.
• Warnings are not typically raised for a device failure.
• Examples of warnings are:
• Memory utilization on a server is currently at 65% and increasing. If it reaches 75%, response
times will be unacceptably long and the OLA for that department will be breached.
• The collision rate on a network has increased by 15% over the past hour.
Exception Event
• An exception means that a service or device is currently operating abnormally (however that has
been defined).
• Typically, this means that an OLA and SLA have been breached and the business is being
impacted.
• Exceptions could represent a total failure, impaired functionality or degraded performance.
• Examples of exceptions include:
• A server is down
• Response time of a standard transaction across the network has slowed to more than 15
seconds
• A segment of the network is not responding to routine requests.
21
Event Management - Logging and Filtering
Event
Filter
Exception
Information
Warning
22
Event Management - Managing Exceptions
Exception
Incident
Management
Incident
Problem
Management
Problem
Change
Management
RFC
Incident/
Problem /
Change?
23
Event Management - Information & Warnings
Information
Log
Warning
Problem
RFC
Incident/
Problem /
Change?
Incident
Alert Human
Intervention
Auto
Response
EVENT
MANAGEMENT
25
Event Management - Roles
• Event management roles are filled by people in the following functions
• Service Desk
• Technical Management
• Application Management
• IT Operations Management
Incident Management
Incident Management
• Incident
• An incident is any occurrence which causes or may cause interruption or degradation to an IT Service.
• The usual priority when an incident occurs must be to restore normal service as quickly as possible, with minimum
disruption to the users.
• An incident defined as an unplanned, unexpected or unexplained disruption in service.
• This is any event which is not part of the standard operation of a service and which causes or may cause an
interruption to or a reduction in the quality of the service that is provided.
• Example
• E.g. mail server not responding to incoming or outgoing messages.
• Incident Management
• Concerned with the rapid restoration of services and with minimization of impact to the business.
• In most but not all cases the Incident Management process is owned and executed by the Service Desk.
Basic Activities or Steps of Incident Mgmt.
• Detection
• The incident becomes known by any mechanism,
• e.g. user call, system alert, etc.
• Logging
• Details of the incident are recorded in the incident management system.
• All incidents must be fully logged and date/time stamped, regardless of whether they are raised through a Service
Desk telephone call or whether automatically detected via an event alert.
• Classification
• The incident is categorized according to predefined criteria for the purpose of facilitating diagnosis and prioritizing its
handling relative to other incidents.
• Prioritization
• The impact and urgency of the incident are determined and factored together to determine its relative priority
among other incidents.
Continued….
• Initial Diagnosis
• If the incident has been routed via the Service Desk,
• Service Desk analyst must carry out initial diagnosis, using diagnostic scripts and known error information to try to discover
the full symptoms of the incident and to determine exactly what has gone wrong.
• The Service Desk representative will utilize the collected information on the symptoms and use that information to initiate a
search of the Knowledge Base to find an appropriate solution. If possible, the Service Desk Analyst will resolve the incident
and close the incident if the resolution is successful.
• Escalation
• If necessary, the incident may be forwarded to the appropriate handling group.
• Investigation and initial diagnosis
• Additional details regarding the incident are gathered and used along with tools such as the Known Error Database to
attempt resolution.
• Resolution and Recovery
• Service is restored and users are provided assistance to allow them to resume work.
• Closure
• Successful resolution of the incident is verified with the user, the incident resolution details are recorded, and the incident is
flagged as being closed in the incident management system.
INCIDENT MANAGEMENT
INCIDENT MANAGEMENT
Request Fulfillment Management
Request fulfillment Management
• Service request is a request from a user for
• Information
• Advice
• Standard change
• Access to
• Request fulfillment Management
• Process that manages service requests received from the users.
• It is important to distinguish between incidents and service requests.
• Incidents are unplanned and require Change Management approval prior to
resolution.
• A service request, on the other hand, is a request that has a standard
procedure for response and is pre-approved by Change Management.
IT
Service
Continued….
• All requests should be logged and tracked.
• The process should include appropriate approval before fulfilling the request.
Continued…
• The term ‘Service Request’ is used as a generic description for many varying types of demands
that are placed upon the IT Department by the users.
• Many of these are actually small changes – low risk, frequently occurring, low cost, etc.
• A request to change a password
• A request to install an additional software application onto a particular workstation
• A request to relocate some items of desktop equipment
• A question requesting information
Objective of the request fulfillment process
• To provide a channel for users to request and receive standard services for which
a pre-defined approval and qualification process exists
• To provide information to users and customers about the availability of services
and the procedure for obtaining them
• To source and deliver the components of requested standard services
• (e.g. licences and software media)
• To assist with general information, complaints or comments
Role of request fulfillment process
• Not usually dedicated staff
• Service Desk staff
• Incident Management staff
• Service Operations teams
Thank You
For Your Patience

More Related Content

What's hot

CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architectureKarthikeyan Dhayalan
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)Sam Bowne
 
Essential Security Control Implementation in IT
Essential Security Control Implementation in ITEssential Security Control Implementation in IT
Essential Security Control Implementation in ITProfessor Lili Saghafi
 
Ch 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsSam Bowne
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 
Functions and features network management
Functions and features network managementFunctions and features network management
Functions and features network managementFlightcase1
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Securitymanoharparakh
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup Ricoh India Limited
 
Major roles of noc services
Major roles of noc servicesMajor roles of noc services
Major roles of noc servicesElena Benson
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset SecuritySam Bowne
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12jemtallon
 
Managed IT Solutions
Managed IT SolutionsManaged IT Solutions
Managed IT SolutionsJohn Maguire
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networksjayussuryawan
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project Robert D. Williams
 

What's hot (20)

CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architecture
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
Unit4
Unit4Unit4
Unit4
 
Essential Security Control Implementation in IT
Essential Security Control Implementation in ITEssential Security Control Implementation in IT
Essential Security Control Implementation in IT
 
Ch 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management Concepts
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Functions and features network management
Functions and features network managementFunctions and features network management
Functions and features network management
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Security
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
 
Major roles of noc services
Major roles of noc servicesMajor roles of noc services
Major roles of noc services
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12
 
Managed IT Solutions
Managed IT SolutionsManaged IT Solutions
Managed IT Solutions
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
 

Similar to ITIL # Lecture 8

05. itil v3 service operation 2020.pptx
05. itil v3 service operation 2020.pptx05. itil v3 service operation 2020.pptx
05. itil v3 service operation 2020.pptxzaledinwswd
 
ITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL-v3-Incident-Management-Process-PPT-RED.pdfITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL-v3-Incident-Management-Process-PPT-RED.pdfManishKumar526001
 
ITIL Service Operation
ITIL Service OperationITIL Service Operation
ITIL Service OperationMarvin Sirait
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptxdotco
 
Service Operation Processes
Service Operation ProcessesService Operation Processes
Service Operation Processesnuwulang
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industryHappiest Minds Technologies
 
ITIL(v3): A Beginers Guide
ITIL(v3): A Beginers GuideITIL(v3): A Beginers Guide
ITIL(v3): A Beginers GuideMd. Rezaul Islam
 
Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major IncidentNUS-ISS
 
Managed solutions Solution
Managed solutions SolutionManaged solutions Solution
Managed solutions SolutionLen Moncrieffe
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptxdotco
 
Labtech 0013-service desk-best_practices
Labtech 0013-service desk-best_practicesLabtech 0013-service desk-best_practices
Labtech 0013-service desk-best_practicesAnjoum .
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptxdotco
 
ITIL (IT Infrastructure Library)
ITIL (IT Infrastructure Library) ITIL (IT Infrastructure Library)
ITIL (IT Infrastructure Library) Nghia Le
 
Itil v3 foundation study guide service operation
Itil v3 foundation study guide   service operationItil v3 foundation study guide   service operation
Itil v3 foundation study guide service operationMuhammad Zamzani
 
Network Operations Center (NOC)
Network Operations Center (NOC)Network Operations Center (NOC)
Network Operations Center (NOC)Boni Yeamin
 
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Genpact Ltd
 

Similar to ITIL # Lecture 8 (20)

05. itil v3 service operation 2020.pptx
05. itil v3 service operation 2020.pptx05. itil v3 service operation 2020.pptx
05. itil v3 service operation 2020.pptx
 
6 service operation
6 service operation6 service operation
6 service operation
 
6 service operation
6 service operation6 service operation
6 service operation
 
ITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL-v3-Incident-Management-Process-PPT-RED.pdfITIL-v3-Incident-Management-Process-PPT-RED.pdf
ITIL-v3-Incident-Management-Process-PPT-RED.pdf
 
ITIL Service Operation
ITIL Service OperationITIL Service Operation
ITIL Service Operation
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Service Operation Processes
Service Operation ProcessesService Operation Processes
Service Operation Processes
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
 
ITIL(v3): A Beginers Guide
ITIL(v3): A Beginers GuideITIL(v3): A Beginers Guide
ITIL(v3): A Beginers Guide
 
Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major Incident
 
Managed solutions Solution
Managed solutions SolutionManaged solutions Solution
Managed solutions Solution
 
Network Operations Center
Network Operations Center  Network Operations Center
Network Operations Center
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptx
 
Naveen Kumar Srivastav
Naveen Kumar SrivastavNaveen Kumar Srivastav
Naveen Kumar Srivastav
 
Labtech 0013-service desk-best_practices
Labtech 0013-service desk-best_practicesLabtech 0013-service desk-best_practices
Labtech 0013-service desk-best_practices
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
 
ITIL (IT Infrastructure Library)
ITIL (IT Infrastructure Library) ITIL (IT Infrastructure Library)
ITIL (IT Infrastructure Library)
 
Itil v3 foundation study guide service operation
Itil v3 foundation study guide   service operationItil v3 foundation study guide   service operation
Itil v3 foundation study guide service operation
 
Network Operations Center (NOC)
Network Operations Center (NOC)Network Operations Center (NOC)
Network Operations Center (NOC)
 
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
 

More from Kabul Education University

Searching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan lawSearching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan lawKabul Education University
 

More from Kabul Education University (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
ITIL # Lecture 2
ITIL # Lecture 2ITIL # Lecture 2
ITIL # Lecture 2
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Network security # Lecture 2
Network security # Lecture 2Network security # Lecture 2
Network security # Lecture 2
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Searching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan lawSearching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan law
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 
Csc342 lec 7 network security des
Csc342  lec 7 network security desCsc342  lec 7 network security des
Csc342 lec 7 network security des
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 
Network Security Goals
Network Security GoalsNetwork Security Goals
Network Security Goals
 
Lect 4 computer forensics
Lect 4 computer forensicsLect 4 computer forensics
Lect 4 computer forensics
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

ITIL # Lecture 8

  • 1. Lec-8: ITIL Mr. Islahuddin Jalal MS (Cyber Security) – UKM Malaysia Research Title – 3C-CSIRT Model for Afghanistan BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
  • 2. Outlines to be discussed ……………Today • Service Operation phase of ITIL • Service operation purpose • Service operation scope • Service operation processes • Event management • Incident Management • Request fulfillment Management
  • 4. Service Operation • Managing day-to-day activities and infrastructure • Responsible for business-as-usual activities • Executing processes to optimize cost and quality • Enabling the business to meet its objectives • Effective functioning of components
  • 5. Service Operation • Maintenance • Management • Realises Strategic Objectives and is where the Value is seen
  • 6. Continued…. • Service operation in neither an organizational unit nor a single process • But • It include • Several functions • Many processes and activities • It includes guidance on achieving effectiveness and efficiency in the delivery and support of services so as to ensure value for the customer and the service provider
  • 7. Functions in Service Operation • Service Desk • Technical Management • IT Operations Management • Applications Management
  • 8. Processes in Service Operation • Event management • Problem management • Incident Management • Request Fulfilment • Access Management We will discuss these managements in detail.
  • 9. Continued… • When service interruptions do occur, service operation is charged with restoring service as quickly as possible and with minimizing the impact to the business • It is the only lifecycle phase in which value is actually realized by customers. Whereas all other phases of the Service Lifecycle contribute to and enable value, it is only experienced during Service Operation.
  • 10. Value to the business • Service operation is where the value is seen • Services run within budget and ROI targets • Design flaws fixed and unforeseen requirements satisfies • Efficiency gains achieved • Services optimized
  • 11. Service Operation Purpose • To coordinate and carry out the activities and processes required to deliver and managed services within agreed parameter • Responsible for current management of the technology
  • 12. It is all about balance • Focus • Internal versus external • Stability versus responsiveness • Cost versus quality • Reactive versus proactive7
  • 13. Service Operation scope • Includes • Services • Service management processes • Infrastructure • People
  • 15. EVENT MANAGEMENT • Event An alert or notification created by • any IT Service • Configuration Item • monitoring tool. • For example • A batch job has completed. Events typically require IT Operations personnel to take actions, and often lead to Incidents being logged. • Event Management The Process responsible for managing Events throughout their Lifecycle.
  • 16. EVENT MANAGEMENT • There are many different types of events: • Events that signify regular operation − Notification that a scheduled workload has completed − An e-mail has reached its intended recipient • Events that signify an exception − A user attempts to log on to an application with the incorrect password − A device’s CPU is above the acceptable utilization rate • Events that signify unusual, but not exceptional, operation. − A server’s memory utilization reaches within 5% of its highest acceptable performance level
  • 17. EVENT MANAGEMENT • Examples of event categories • Informational • Warning • exceptional
  • 18. Informational Event • This refers to an event that does not require any action and does not represent an exception. • They are typically stored in the system or service log files and kept for a predetermined period. • Informational events are typically used to check on the status of a device or service, or to confirm the successful completion of an activity. • Examples of informational events include: • A user logs onto an application • A job in the batch queue completes successfully A device has come online • A transaction is completed successfully.
  • 19. Warning Event • A warning is an event that is generated when a service or device is approaching a threshold. • Warnings are intended to notify the appropriate person, process or tool so that the situation can be checked and the appropriate action taken to prevent an exception. • Warnings are not typically raised for a device failure. • Examples of warnings are: • Memory utilization on a server is currently at 65% and increasing. If it reaches 75%, response times will be unacceptably long and the OLA for that department will be breached. • The collision rate on a network has increased by 15% over the past hour.
  • 20. Exception Event • An exception means that a service or device is currently operating abnormally (however that has been defined). • Typically, this means that an OLA and SLA have been breached and the business is being impacted. • Exceptions could represent a total failure, impaired functionality or degraded performance. • Examples of exceptions include: • A server is down • Response time of a standard transaction across the network has slowed to more than 15 seconds • A segment of the network is not responding to routine requests.
  • 21. 21 Event Management - Logging and Filtering Event Filter Exception Information Warning
  • 22. 22 Event Management - Managing Exceptions Exception Incident Management Incident Problem Management Problem Change Management RFC Incident/ Problem / Change?
  • 23. 23 Event Management - Information & Warnings Information Log Warning Problem RFC Incident/ Problem / Change? Incident Alert Human Intervention Auto Response
  • 25. 25 Event Management - Roles • Event management roles are filled by people in the following functions • Service Desk • Technical Management • Application Management • IT Operations Management
  • 27. Incident Management • Incident • An incident is any occurrence which causes or may cause interruption or degradation to an IT Service. • The usual priority when an incident occurs must be to restore normal service as quickly as possible, with minimum disruption to the users. • An incident defined as an unplanned, unexpected or unexplained disruption in service. • This is any event which is not part of the standard operation of a service and which causes or may cause an interruption to or a reduction in the quality of the service that is provided. • Example • E.g. mail server not responding to incoming or outgoing messages. • Incident Management • Concerned with the rapid restoration of services and with minimization of impact to the business. • In most but not all cases the Incident Management process is owned and executed by the Service Desk.
  • 28. Basic Activities or Steps of Incident Mgmt. • Detection • The incident becomes known by any mechanism, • e.g. user call, system alert, etc. • Logging • Details of the incident are recorded in the incident management system. • All incidents must be fully logged and date/time stamped, regardless of whether they are raised through a Service Desk telephone call or whether automatically detected via an event alert. • Classification • The incident is categorized according to predefined criteria for the purpose of facilitating diagnosis and prioritizing its handling relative to other incidents. • Prioritization • The impact and urgency of the incident are determined and factored together to determine its relative priority among other incidents.
  • 29. Continued…. • Initial Diagnosis • If the incident has been routed via the Service Desk, • Service Desk analyst must carry out initial diagnosis, using diagnostic scripts and known error information to try to discover the full symptoms of the incident and to determine exactly what has gone wrong. • The Service Desk representative will utilize the collected information on the symptoms and use that information to initiate a search of the Knowledge Base to find an appropriate solution. If possible, the Service Desk Analyst will resolve the incident and close the incident if the resolution is successful. • Escalation • If necessary, the incident may be forwarded to the appropriate handling group. • Investigation and initial diagnosis • Additional details regarding the incident are gathered and used along with tools such as the Known Error Database to attempt resolution. • Resolution and Recovery • Service is restored and users are provided assistance to allow them to resume work. • Closure • Successful resolution of the incident is verified with the user, the incident resolution details are recorded, and the incident is flagged as being closed in the incident management system.
  • 33. Request fulfillment Management • Service request is a request from a user for • Information • Advice • Standard change • Access to • Request fulfillment Management • Process that manages service requests received from the users. • It is important to distinguish between incidents and service requests. • Incidents are unplanned and require Change Management approval prior to resolution. • A service request, on the other hand, is a request that has a standard procedure for response and is pre-approved by Change Management. IT Service
  • 34. Continued…. • All requests should be logged and tracked. • The process should include appropriate approval before fulfilling the request.
  • 35. Continued… • The term ‘Service Request’ is used as a generic description for many varying types of demands that are placed upon the IT Department by the users. • Many of these are actually small changes – low risk, frequently occurring, low cost, etc. • A request to change a password • A request to install an additional software application onto a particular workstation • A request to relocate some items of desktop equipment • A question requesting information
  • 36. Objective of the request fulfillment process • To provide a channel for users to request and receive standard services for which a pre-defined approval and qualification process exists • To provide information to users and customers about the availability of services and the procedure for obtaining them • To source and deliver the components of requested standard services • (e.g. licences and software media) • To assist with general information, complaints or comments
  • 37. Role of request fulfillment process • Not usually dedicated staff • Service Desk staff • Incident Management staff • Service Operations teams
  • 38. Thank You For Your Patience

Editor's Notes

  1. Purpose: Key Message: Additional Information: Transition to Next Slide: