Preview

Unit 2 Lab

Satisfactory Essays
Open Document
Open Document
330 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Lab
Michael Sherman
Unit 2 Lab

COBIT is the Control Objectives for Information and related Technology. It is designed to provide a framework for the control of IT functions and is a set of good practices for IT management. COBIT was written by the IT Governance Institute (ITGI) with ISACA, formerly known as the Information Systems Audit and Control Association who now only goes by the acronym. COBIT is referenced in many other standards and is well respected. The basic COBIT principle reinforces IT’s role as a support tool for business requirements and needs to be managed just as well as any other resource. The principle states that there is a cycle between IT and business requirements. Business requirements drive investments in IT resources; IT resources are used by IT processes; IT processes deliver enterprise information; and Enterprise information responds to business requirements.
COBIT is organized in four IT domains that are process oriented. Each domain interacts with the others and is focused on the organizations activities. The first domain, Plan and Organize, covers tactics and strategy, comparing its IT resources to the strategic vision of the organization. The second domain, Acquire and Implement, is where the organization purchases and implements new IT solutions. The third, Deliver and Support, uses these resources to deliver their data or services and ensures the IT services are supporting business requirements. The final domain, Monitor and Evaluate, is used to detect problems and implements controls to ensure the IT resources remain effective and efficient.

CMMI is the Capability Maturity Model Integration, which is a management approach to improve processes by determining different levels of maturity. CMMI is used in three areas of interest; product and service development; service establishment, management, and delivery; and product and service acquisition. Security levels are measured under six levels, from Level 0 (no security

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 2130 Lab

    • 191 Words
    • 1 Page

    1. An amino acid consists of a carbon atom attached to a hydrogen atom, an amine group, a side group, and a _____________ group.…

    • 191 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Lab 3

    • 82 Words
    • 1 Page

    f. ping –c3 IP where IP is the IP address of a remote system such as the router…

    • 82 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Labs JM

    • 964 Words
    • 5 Pages

    Exercise 1.4.4 – UCS is a standard of characters, it was created so that there would be…

    • 964 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    802.1 handle architecture, security, management, and internetworking of LAN, MAN, and WAN standardized by IEEE802. It provides internetworking, audio/video bridging, data center bridging and security.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Lab 8

    • 1017 Words
    • 8 Pages

    If you used the number of bytes instead you would get a whole different amount of possible networks which isn’t right.…

    • 1017 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 192 Words
    • 1 Page

    11. What is the command to enable RIP on a CISCO router and what mode must be enabled to execute the command?…

    • 192 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    TCP – This protocol is what is used to break data down into manageable pieces and package them to send out to the proper address.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Consists of three vantage points: business objectives – info must conform to seven categories of criteria that map into the objectives established by the COSO to satisfy business objectives. IT resources – includes people, application systems, technology, facilities, and data. IT Processes – broken into 4 domains: planning and organizing, acquisition and implementation, delivery and support, and monitoring and…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Cmgt/554 Week 2

    • 1453 Words
    • 6 Pages

    In order for an organization to be able to have an efficient and successful organization the proper Information Technology system (IT) must be in place, this document will demonstrate what system is in place to make sure system is running successfully.…

    • 1453 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    In society today it has become increasingly necessary to effectively use technologically advanced Information systems and software applications to run an organization. In our technologically advanced and dynamic society, organizations are being pushed to use and operate updated and advanced information systems and software applications to store information, process data and effectively manage day to day operations. In this paper the subject discussed will be how a CIS (computer information systems) can help an organization, what they are, and an example of a CIS and its uses in a retail environment.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cosco It Strategy

    • 975 Words
    • 4 Pages

    In conclusion it is to say that the development of COSCO’s IT strategy was conventional for the business community. After realizing that isolated IT applications…

    • 975 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cobit Casestudy Tibo

    • 8174 Words
    • 33 Pages

    IT supports business goals, optimises business investment in IT, and appropriately manages IT-related risks and…

    • 8174 Words
    • 33 Pages
    Better Essays
  • Good Essays

    IT processes are the strategic, tactical, and operational activities/tasks that IT performs. The actual names, amount of resources devoted, and total number might vary from one firm to another, based on the organization‘s emphasis. However, they are all required for IT to deliver effective and efficient services. All processes must be performed whether you are a Global 1,000 organization, or you are managing a single PC in the home. Organisations the world over have realised that IT can help transform an organisation in terms of business performance. More and more organisations are leveraging on IT to bring about innovative ways of competing in the industry. IT is being seen as an enabler and driver of business. Some organisations have employed proven IT process frameworks to help align IT with business for improved business performance. Some of the most popular IT process frameworks that have been touted as helping make IT efficient…

    • 6331 Words
    • 22 Pages
    Good Essays