Information Technology Security Risk Assessment A Complete Guide - 2020 Edition. Gerardus Blokdyk

Чтение книги онлайн.

Читать онлайн книгу Information Technology Security Risk Assessment A Complete Guide - 2020 Edition - Gerardus Blokdyk страница 2

Information Technology Security Risk Assessment A Complete Guide - 2020 Edition - Gerardus Blokdyk

Скачать книгу

the question and rate it with the following in front of mind:

      ‘In my belief,

      the answer to this question is clearly defined’.

      There are two ways in which you can choose to interpret this statement;

      1.how aware are you that the answer to the question is clearly defined

      2.for more in-depth analysis you can choose to gather evidence and confirm the answer to the question. This obviously will take more time, most Self-Assessment users opt for the first way to interpret the question and dig deeper later on based on the outcome of the overall Self-Assessment.

      A score of ‘1’ would mean that the answer is not clear at all, where a ‘5’ would mean the answer is crystal clear and defined. Leave emtpy when the question is not applicable or you don’t want to answer it, you can skip it without affecting your score. Write your score in the space provided.

      After you have responded to all the appropriate statements in each section, compute your average score for that section, using the formula provided, and round to the nearest tenth. Then transfer to the corresponding spoke in the Information Technology Security Risk Assessment Scorecard on the second next page of the Self-Assessment.

      Your completed Information Technology Security Risk Assessment Scorecard will give you a clear presentation of which Information Technology Security Risk Assessment areas need attention.

      Information Technology Security Risk Assessment

      Scorecard Example

      Example of how the finalized Scorecard can look like:

      Information Technology Security Risk Assessment

      Scorecard

      Your Scores:

      BEGINNING OF THE

      SELF-ASSESSMENT:

      Table of Contents

      About The Art of Service8

      Included Resources - how to access8

      Purpose of this Self-Assessment10

      How to use the Self-Assessment11

      Information Technology Security Risk Assessment

      Scorecard Example13

      Information Technology Security Risk Assessment

      Scorecard14

      BEGINNING OF THE

      SELF-ASSESSMENT:15

      CRITERION #1: RECOGNIZE16

      CRITERION #2: DEFINE:29

      CRITERION #3: MEASURE:45

      CRITERION #4: ANALYZE:60

      CRITERION #5: IMPROVE:77

      CRITERION #6: CONTROL:94

      CRITERION #7: SUSTAIN:107

      Information Technology Security Risk Assessment and Managing Projects, Criteria for Project Managers:133

      1.0 Initiating Process Group: Information Technology Security Risk Assessment134

      1.1 Project Charter: Information Technology Security Risk Assessment136

      1.2 Stakeholder Register: Information Technology Security Risk Assessment138

      1.3 Stakeholder Analysis Matrix: Information Technology Security Risk Assessment139

      2.0 Planning Process Group: Information Technology Security Risk Assessment141

      2.1 Project Management Plan: Information Technology Security Risk Assessment144

      2.2 Scope Management Plan: Information Technology Security Risk Assessment146

      2.3 Requirements Management Plan: Information Technology Security Risk Assessment148

      2.4 Requirements Documentation: Information Technology Security Risk Assessment150

      2.5 Requirements Traceability Matrix: Information Technology Security Risk Assessment152

      2.6 Project Scope Statement: Information Technology Security Risk Assessment154

      2.7 Assumption and Constraint Log: Information Technology Security Risk Assessment156

      2.8 Work Breakdown Structure: Information Technology Security Risk Assessment159

      2.9 WBS Dictionary: Information Technology Security Risk Assessment161

      2.10 Schedule Management Plan: Information Technology Security Risk Assessment163

      2.11 Activity List: Information Technology Security Risk Assessment165

      2.12 Activity Attributes: Information Technology Security Risk Assessment167

      2.13 Milestone List: Information Technology Security Risk Assessment169

      2.14 Network Diagram: Information Technology Security Risk Assessment171

      2.15 Activity Resource Requirements: Information Technology Security Risk Assessment173

      2.16 Resource Breakdown Structure: Information Technology Security Risk Assessment175

      2.17 Activity Duration Estimates: Information Technology Security Risk Assessment177

      2.18 Duration Estimating Worksheet: Information Technology Security Risk Assessment180

      2.19 Project Schedule: Information Technology Security Risk Assessment182

      2.20 Cost Management Plan: Information Technology Security Risk Assessment184

      2.21 Activity Cost Estimates: Information Technology Security Risk Assessment186

      2.22 Cost Estimating Worksheet: Information Technology Security Risk Assessment188

      2.23 Cost Baseline: Information Technology Security Risk Assessment190

      2.24 Quality Management Plan: Information Technology Security Risk Assessment192

      2.25 Quality Metrics: Information Technology Security Risk Assessment194

      2.26 Process Improvement Plan: Information Technology Security Risk Assessment196

      2.27 Responsibility Assignment Matrix: Information Technology Security Risk Assessment198

      2.28 Roles and Responsibilities: Information Technology Security Risk Assessment200

Скачать книгу