Gerardus Blokdyk

Information Systems Security Engineering A Complete Guide - 2020 Edition


Скачать книгу

the appropriate statements in each section, compute your average score for that section, using the formula provided, and round to the nearest tenth. Then transfer to the corresponding spoke in the Information Systems Security Engineering Scorecard on the second next page of the Self-Assessment.

      Your completed Information Systems Security Engineering Scorecard will give you a clear presentation of which Information Systems Security Engineering areas need attention.

      Information Systems Security Engineering

      Scorecard Example

      Example of how the finalized Scorecard can look like:

      Information Systems Security Engineering

      Scorecard

      Your Scores:

      BEGINNING OF THE

      SELF-ASSESSMENT:

      Table of Contents

      About The Art of Service8

      Included Resources - how to access8

      Purpose of this Self-Assessment10

      How to use the Self-Assessment11

      Information Systems Security Engineering

      Scorecard Example13

      Information Systems Security Engineering

      Scorecard14

      BEGINNING OF THE

      SELF-ASSESSMENT:15

      CRITERION #1: RECOGNIZE16

      CRITERION #2: DEFINE:28

      CRITERION #3: MEASURE:44

      CRITERION #4: ANALYZE:59

      CRITERION #5: IMPROVE:75

      CRITERION #6: CONTROL:92

      CRITERION #7: SUSTAIN:104

      Information Systems Security Engineering and Managing Projects, Criteria for Project Managers:130

      1.0 Initiating Process Group: Information Systems Security Engineering131

      1.1 Project Charter: Information Systems Security Engineering133

      1.2 Stakeholder Register: Information Systems Security Engineering135

      1.3 Stakeholder Analysis Matrix: Information Systems Security Engineering136

      2.0 Planning Process Group: Information Systems Security Engineering138

      2.1 Project Management Plan: Information Systems Security Engineering140

      2.2 Scope Management Plan: Information Systems Security Engineering142

      2.3 Requirements Management Plan: Information Systems Security Engineering144

      2.4 Requirements Documentation: Information Systems Security Engineering146

      2.5 Requirements Traceability Matrix: Information Systems Security Engineering148

      2.6 Project Scope Statement: Information Systems Security Engineering150

      2.7 Assumption and Constraint Log: Information Systems Security Engineering152

      2.8 Work Breakdown Structure: Information Systems Security Engineering154

      2.9 WBS Dictionary: Information Systems Security Engineering156

      2.10 Schedule Management Plan: Information Systems Security Engineering159

      2.11 Activity List: Information Systems Security Engineering161

      2.12 Activity Attributes: Information Systems Security Engineering163

      2.13 Milestone List: Information Systems Security Engineering165

      2.14 Network Diagram: Information Systems Security Engineering167

      2.15 Activity Resource Requirements: Information Systems Security Engineering169

      2.16 Resource Breakdown Structure: Information Systems Security Engineering171

      2.17 Activity Duration Estimates: Information Systems Security Engineering173

      2.18 Duration Estimating Worksheet: Information Systems Security Engineering175

      2.19 Project Schedule: Information Systems Security Engineering177

      2.20 Cost Management Plan: Information Systems Security Engineering179

      2.21 Activity Cost Estimates: Information Systems Security Engineering181

      2.22 Cost Estimating Worksheet: Information Systems Security Engineering183

      2.23 Cost Baseline: Information Systems Security Engineering185

      2.24 Quality Management Plan: Information Systems Security Engineering187

      2.25 Quality Metrics: Information Systems Security Engineering189

      2.26 Process Improvement Plan: Information Systems Security Engineering191

      2.27 Responsibility Assignment Matrix: Information Systems Security Engineering193

      2.28 Roles and Responsibilities: Information Systems Security Engineering195

      2.29 Human Resource Management Plan: Information Systems Security Engineering197

      2.30 Communications Management Plan: Information Systems Security Engineering199

      2.31 Risk Management Plan: Information Systems Security Engineering201

      2.32 Risk Register: Information Systems Security Engineering203

      2.33 Probability and Impact Assessment: Information Systems Security Engineering205

      2.34 Probability and Impact Matrix: Information Systems Security Engineering207

      2.35 Risk Data Sheet: Information Systems Security Engineering209

      2.36 Procurement Management Plan: Information Systems Security Engineering211

      2.37 Source Selection Criteria: Information Systems Security Engineering213

      2.38 Stakeholder Management Plan: Information Systems Security Engineering215

      2.39 Change Management Plan: Information Systems Security Engineering217

      3.0 Executing Process Group: Information Systems Security Engineering219

      3.1 Team Member Status Report: Information Systems Security Engineering221

      3.2 Change Request: Information Systems Security Engineering223

      3.3 Change Log: Information Systems Security Engineering225

      3.4 Decision Log: Information Systems Security Engineering227

      3.5 Quality Audit: Information Systems Security Engineering229

      3.6 Team Directory: Information Systems Security Engineering232

      3.7 Team Operating Agreement: Information Systems Security Engineering234

      3.8 Team Performance Assessment: Information Systems Security Engineering236

      3.9 Team Member Performance Assessment: Information Systems Security Engineering238

      3.10 Issue Log: Information Systems Security Engineering240

      4.0 Monitoring and Controlling Process Group: Information Systems Security Engineering242

      4.1 Project Performance Report: Information Systems Security Engineering244

      4.2 Variance Analysis: Information Systems Security Engineering246

      4.3 Earned Value Status: Information Systems Security Engineering248

      4.4 Risk Audit: Information Systems Security