Information Technology Security Risk Assessment A Complete Guide - 2020 Edition. Gerardus Blokdyk
Чтение книги онлайн.
Читать онлайн книгу Information Technology Security Risk Assessment A Complete Guide - 2020 Edition - Gerardus Blokdyk страница 2
‘In my belief,
the answer to this question is clearly defined’.
There are two ways in which you can choose to interpret this statement;
1.how aware are you that the answer to the question is clearly defined
2.for more in-depth analysis you can choose to gather evidence and confirm the answer to the question. This obviously will take more time, most Self-Assessment users opt for the first way to interpret the question and dig deeper later on based on the outcome of the overall Self-Assessment.
A score of ‘1’ would mean that the answer is not clear at all, where a ‘5’ would mean the answer is crystal clear and defined. Leave emtpy when the question is not applicable or you don’t want to answer it, you can skip it without affecting your score. Write your score in the space provided.
After you have responded to all the appropriate statements in each section, compute your average score for that section, using the formula provided, and round to the nearest tenth. Then transfer to the corresponding spoke in the Information Technology Security Risk Assessment Scorecard on the second next page of the Self-Assessment.
Your completed Information Technology Security Risk Assessment Scorecard will give you a clear presentation of which Information Technology Security Risk Assessment areas need attention.
Information Technology Security Risk Assessment
Scorecard Example
Example of how the finalized Scorecard can look like:
Information Technology Security Risk Assessment
Scorecard
Your Scores:
BEGINNING OF THE
SELF-ASSESSMENT:
Table of Contents
About The Art of Service8
Included Resources - how to access8
Purpose of this Self-Assessment10
How to use the Self-Assessment11
Information Technology Security Risk Assessment
Scorecard Example13
Information Technology Security Risk Assessment
Scorecard14
BEGINNING OF THE
SELF-ASSESSMENT:15
CRITERION #1: RECOGNIZE16
CRITERION #2: DEFINE:29
CRITERION #3: MEASURE:45
CRITERION #4: ANALYZE:60
CRITERION #5: IMPROVE:77
CRITERION #6: CONTROL:94
CRITERION #7: SUSTAIN:107
Information Technology Security Risk Assessment and Managing Projects, Criteria for Project Managers:133
1.0 Initiating Process Group: Information Technology Security Risk Assessment134
1.1 Project Charter: Information Technology Security Risk Assessment136
1.2 Stakeholder Register: Information Technology Security Risk Assessment138
1.3 Stakeholder Analysis Matrix: Information Technology Security Risk Assessment139
2.0 Planning Process Group: Information Technology Security Risk Assessment141
2.1 Project Management Plan: Information Technology Security Risk Assessment144
2.2 Scope Management Plan: Information Technology Security Risk Assessment146
2.3 Requirements Management Plan: Information Technology Security Risk Assessment148
2.4 Requirements Documentation: Information Technology Security Risk Assessment150
2.5 Requirements Traceability Matrix: Information Technology Security Risk Assessment152
2.6 Project Scope Statement: Information Technology Security Risk Assessment154
2.7 Assumption and Constraint Log: Information Technology Security Risk Assessment156
2.8 Work Breakdown Structure: Information Technology Security Risk Assessment159
2.9 WBS Dictionary: Information Technology Security Risk Assessment161
2.10 Schedule Management Plan: Information Technology Security Risk Assessment163
2.11 Activity List: Information Technology Security Risk Assessment165
2.12 Activity Attributes: Information Technology Security Risk Assessment167
2.13 Milestone List: Information Technology Security Risk Assessment169
2.14 Network Diagram: Information Technology Security Risk Assessment171
2.15 Activity Resource Requirements: Information Technology Security Risk Assessment173
2.16 Resource Breakdown Structure: Information Technology Security Risk Assessment175
2.17 Activity Duration Estimates: Information Technology Security Risk Assessment177
2.18 Duration Estimating Worksheet: Information Technology Security Risk Assessment180
2.19 Project Schedule: Information Technology Security Risk Assessment182
2.20 Cost Management Plan: Information Technology Security Risk Assessment184
2.21 Activity Cost Estimates: Information Technology Security Risk Assessment186
2.22 Cost Estimating Worksheet: Information Technology Security Risk Assessment188
2.23 Cost Baseline: Information Technology Security Risk Assessment190
2.24 Quality Management Plan: Information Technology Security Risk Assessment192
2.25 Quality Metrics: Information Technology Security Risk Assessment194
2.26 Process Improvement Plan: Information Technology Security Risk Assessment196
2.27 Responsibility Assignment Matrix: Information Technology Security Risk Assessment198
2.28 Roles and Responsibilities: Information Technology Security Risk Assessment200