Security Administration A Complete Guide - 2020 Edition. Gerardus Blokdyk
Чтение книги онлайн.
Читать онлайн книгу Security Administration A Complete Guide - 2020 Edition - Gerardus Blokdyk страница 2
There are two ways in which you can choose to interpret this statement;
1.how aware are you that the answer to the question is clearly defined
2.for more in-depth analysis you can choose to gather evidence and confirm the answer to the question. This obviously will take more time, most Self-Assessment users opt for the first way to interpret the question and dig deeper later on based on the outcome of the overall Self-Assessment.
A score of ‘1’ would mean that the answer is not clear at all, where a ‘5’ would mean the answer is crystal clear and defined. Leave emtpy when the question is not applicable or you don’t want to answer it, you can skip it without affecting your score. Write your score in the space provided.
After you have responded to all the appropriate statements in each section, compute your average score for that section, using the formula provided, and round to the nearest tenth. Then transfer to the corresponding spoke in the Security Administration Scorecard on the second next page of the Self-Assessment.
Your completed Security Administration Scorecard will give you a clear presentation of which Security Administration areas need attention.
Security Administration
Scorecard Example
Example of how the finalized Scorecard can look like:
Security Administration
Scorecard
Your Scores:
BEGINNING OF THE
SELF-ASSESSMENT:
Table of Contents
About The Art of Service7
Included Resources - how to access7
Purpose of this Self-Assessment9
How to use the Self-Assessment10
Security Administration
Scorecard Example12
Security Administration
Scorecard13
BEGINNING OF THE
SELF-ASSESSMENT:14
CRITERION #1: RECOGNIZE15
CRITERION #2: DEFINE:27
CRITERION #3: MEASURE:43
CRITERION #4: ANALYZE:57
CRITERION #5: IMPROVE:73
CRITERION #6: CONTROL:89
CRITERION #7: SUSTAIN:102
Security Administration and Managing Projects, Criteria for Project Managers:127
1.0 Initiating Process Group: Security Administration128
1.1 Project Charter: Security Administration130
1.2 Stakeholder Register: Security Administration132
1.3 Stakeholder Analysis Matrix: Security Administration133
2.0 Planning Process Group: Security Administration135
2.1 Project Management Plan: Security Administration137
2.2 Scope Management Plan: Security Administration139
2.3 Requirements Management Plan: Security Administration141
2.4 Requirements Documentation: Security Administration143
2.5 Requirements Traceability Matrix: Security Administration145
2.6 Project Scope Statement: Security Administration147
2.7 Assumption and Constraint Log: Security Administration149
2.8 Work Breakdown Structure: Security Administration151
2.9 WBS Dictionary: Security Administration153
2.10 Schedule Management Plan: Security Administration156
2.11 Activity List: Security Administration158
2.12 Activity Attributes: Security Administration160
2.13 Milestone List: Security Administration162
2.14 Network Diagram: Security Administration164
2.15 Activity Resource Requirements: Security Administration166
2.16 Resource Breakdown Structure: Security Administration168
2.17 Activity Duration Estimates: Security Administration170
2.18 Duration Estimating Worksheet: Security Administration172
2.19 Project Schedule: Security Administration174
2.20 Cost Management Plan: Security Administration176
2.21 Activity Cost Estimates: Security Administration178
2.22 Cost Estimating Worksheet: Security Administration180
2.23 Cost Baseline: Security Administration182
2.24 Quality Management Plan: Security Administration184
2.25 Quality Metrics: Security Administration186
2.26 Process Improvement Plan: Security Administration188
2.27 Responsibility Assignment Matrix: Security Administration190
2.28 Roles and Responsibilities: Security Administration192
2.29 Human Resource Management Plan: Security Administration194
2.30 Communications Management Plan: Security Administration196
2.31 Risk Management Plan: Security Administration198
2.32 Risk Register: Security Administration200
2.33 Probability and Impact Assessment: Security Administration202
2.34 Probability and Impact Matrix: Security Administration204
2.35 Risk Data Sheet: Security Administration206
2.36 Procurement Management Plan: Security Administration208
2.37 Source Selection Criteria: Security Administration210
2.38