Gerardus Blokdyk

IT Security Risk Assessment A Complete Guide - 2020 Edition


Скачать книгу

and round to the nearest tenth. Then transfer to the corresponding spoke in the IT Security Risk Assessment Scorecard on the second next page of the Self-Assessment.

      Your completed IT Security Risk Assessment Scorecard will give you a clear presentation of which IT Security Risk Assessment areas need attention.

      IT Security Risk Assessment

      Scorecard Example

      Example of how the finalized Scorecard can look like:

      IT Security Risk Assessment

      Scorecard

      Your Scores:

      BEGINNING OF THE

      SELF-ASSESSMENT:

      Table of Contents

      About The Art of Service8

      Included Resources - how to access8

      Purpose of this Self-Assessment10

      How to use the Self-Assessment11

      IT Security Risk Assessment

      Scorecard Example13

      IT Security Risk Assessment

      Scorecard14

      BEGINNING OF THE

      SELF-ASSESSMENT:15

      CRITERION #1: RECOGNIZE16

      CRITERION #2: DEFINE:27

      CRITERION #3: MEASURE:43

      CRITERION #4: ANALYZE:57

      CRITERION #5: IMPROVE:73

      CRITERION #6: CONTROL:90

      CRITERION #7: SUSTAIN:102

      IT Security Risk Assessment and Managing Projects, Criteria for Project Managers:126

      1.0 Initiating Process Group: IT Security Risk Assessment127

      1.1 Project Charter: IT Security Risk Assessment129

      1.2 Stakeholder Register: IT Security Risk Assessment131

      1.3 Stakeholder Analysis Matrix: IT Security Risk Assessment132

      2.0 Planning Process Group: IT Security Risk Assessment134

      2.1 Project Management Plan: IT Security Risk Assessment136

      2.2 Scope Management Plan: IT Security Risk Assessment138

      2.3 Requirements Management Plan: IT Security Risk Assessment140

      2.4 Requirements Documentation: IT Security Risk Assessment142

      2.5 Requirements Traceability Matrix: IT Security Risk Assessment144

      2.6 Project Scope Statement: IT Security Risk Assessment146

      2.7 Assumption and Constraint Log: IT Security Risk Assessment148

      2.8 Work Breakdown Structure: IT Security Risk Assessment150

      2.9 WBS Dictionary: IT Security Risk Assessment152

      2.10 Schedule Management Plan: IT Security Risk Assessment155

      2.11 Activity List: IT Security Risk Assessment157

      2.12 Activity Attributes: IT Security Risk Assessment159

      2.13 Milestone List: IT Security Risk Assessment161

      2.14 Network Diagram: IT Security Risk Assessment163

      2.15 Activity Resource Requirements: IT Security Risk Assessment165

      2.16 Resource Breakdown Structure: IT Security Risk Assessment167

      2.17 Activity Duration Estimates: IT Security Risk Assessment169

      2.18 Duration Estimating Worksheet: IT Security Risk Assessment171

      2.19 Project Schedule: IT Security Risk Assessment173

      2.20 Cost Management Plan: IT Security Risk Assessment175

      2.21 Activity Cost Estimates: IT Security Risk Assessment177

      2.22 Cost Estimating Worksheet: IT Security Risk Assessment179

      2.23 Cost Baseline: IT Security Risk Assessment181

      2.24 Quality Management Plan: IT Security Risk Assessment183

      2.25 Quality Metrics: IT Security Risk Assessment185

      2.26 Process Improvement Plan: IT Security Risk Assessment187

      2.27 Responsibility Assignment Matrix: IT Security Risk Assessment189

      2.28 Roles and Responsibilities: IT Security Risk Assessment191

      2.29 Human Resource Management Plan: IT Security Risk Assessment193

      2.30 Communications Management Plan: IT Security Risk Assessment195

      2.31 Risk Management Plan: IT Security Risk Assessment197

      2.32 Risk Register: IT Security Risk Assessment199

      2.33 Probability and Impact Assessment: IT Security Risk Assessment201

      2.34 Probability and Impact Matrix: IT Security Risk Assessment203

      2.35 Risk Data Sheet: IT Security Risk Assessment205

      2.36 Procurement Management Plan: IT Security Risk Assessment207

      2.37 Source Selection Criteria: IT Security Risk Assessment209

      2.38 Stakeholder Management Plan: IT Security Risk Assessment211

      2.39 Change Management Plan: IT Security Risk Assessment213

      3.0 Executing Process Group: IT Security Risk Assessment215

      3.1 Team Member Status Report: IT Security Risk Assessment217

      3.2 Change Request: IT Security Risk Assessment219

      3.3 Change Log: IT Security Risk Assessment221

      3.4 Decision Log: IT Security Risk Assessment223

      3.5 Quality Audit: IT Security Risk Assessment225

      3.6 Team Directory: IT Security Risk Assessment228

      3.7 Team Operating Agreement: IT Security Risk Assessment230

      3.8 Team Performance Assessment: IT Security Risk Assessment232

      3.9 Team Member Performance Assessment: IT Security Risk Assessment234

      3.10 Issue Log: IT Security Risk Assessment236

      4.0 Monitoring and Controlling Process Group: IT Security Risk Assessment238

      4.1 Project Performance Report: IT Security Risk Assessment240

      4.2 Variance Analysis: IT Security Risk Assessment242

      4.3 Earned Value Status: IT Security Risk Assessment244

      4.4 Risk Audit: IT Security Risk Assessment246

      4.5 Contractor Status Report: IT Security Risk Assessment248

      4.6 Formal Acceptance: IT Security Risk Assessment250

      5.0 Closing Process Group: IT Security Risk Assessment252

      5.1 Procurement Audit: IT Security Risk Assessment254

      5.2 Contract Close-Out: IT Security Risk Assessment256

      5.3 Project or Phase Close-Out: IT Security Risk Assessment258

      5.4 Lessons Learned: IT Security Risk Assessment260

      Index262

      CRITERION #1: RECOGNIZE

      INTENT: Be aware of the need for change. Recognize that there is an