Information Systems Security Engineering A Complete Guide - 2020 Edition. Gerardus Blokdyk

Чтение книги онлайн.

Читать онлайн книгу Information Systems Security Engineering A Complete Guide - 2020 Edition - Gerardus Blokdyk страница 2

Information Systems Security Engineering A Complete Guide - 2020 Edition - Gerardus Blokdyk

Скачать книгу

it with the following in front of mind:

      ‘In my belief,

      the answer to this question is clearly defined’.

      There are two ways in which you can choose to interpret this statement;

      1.how aware are you that the answer to the question is clearly defined

      2.for more in-depth analysis you can choose to gather evidence and confirm the answer to the question. This obviously will take more time, most Self-Assessment users opt for the first way to interpret the question and dig deeper later on based on the outcome of the overall Self-Assessment.

      A score of ‘1’ would mean that the answer is not clear at all, where a ‘5’ would mean the answer is crystal clear and defined. Leave emtpy when the question is not applicable or you don’t want to answer it, you can skip it without affecting your score. Write your score in the space provided.

      After you have responded to all the appropriate statements in each section, compute your average score for that section, using the formula provided, and round to the nearest tenth. Then transfer to the corresponding spoke in the Information Systems Security Engineering Scorecard on the second next page of the Self-Assessment.

      Your completed Information Systems Security Engineering Scorecard will give you a clear presentation of which Information Systems Security Engineering areas need attention.

      Information Systems Security Engineering

      Scorecard Example

      Example of how the finalized Scorecard can look like:

      Information Systems Security Engineering

      Scorecard

      Your Scores:

      BEGINNING OF THE

      SELF-ASSESSMENT:

      Table of Contents

      About The Art of Service8

      Included Resources - how to access8

      Purpose of this Self-Assessment10

      How to use the Self-Assessment11

      Information Systems Security Engineering

      Scorecard Example13

      Information Systems Security Engineering

      Scorecard14

      BEGINNING OF THE

      SELF-ASSESSMENT:15

      CRITERION #1: RECOGNIZE16

      CRITERION #2: DEFINE:28

      CRITERION #3: MEASURE:44

      CRITERION #4: ANALYZE:59

      CRITERION #5: IMPROVE:75

      CRITERION #6: CONTROL:92

      CRITERION #7: SUSTAIN:104

      Information Systems Security Engineering and Managing Projects, Criteria for Project Managers:130

      1.0 Initiating Process Group: Information Systems Security Engineering131

      1.1 Project Charter: Information Systems Security Engineering133

      1.2 Stakeholder Register: Information Systems Security Engineering135

      1.3 Stakeholder Analysis Matrix: Information Systems Security Engineering136

      2.0 Planning Process Group: Information Systems Security Engineering138

      2.1 Project Management Plan: Information Systems Security Engineering140

      2.2 Scope Management Plan: Information Systems Security Engineering142

      2.3 Requirements Management Plan: Information Systems Security Engineering144

      2.4 Requirements Documentation: Information Systems Security Engineering146

      2.5 Requirements Traceability Matrix: Information Systems Security Engineering148

      2.6 Project Scope Statement: Information Systems Security Engineering150

      2.7 Assumption and Constraint Log: Information Systems Security Engineering152

      2.8 Work Breakdown Structure: Information Systems Security Engineering154

      2.9 WBS Dictionary: Information Systems Security Engineering156

      2.10 Schedule Management Plan: Information Systems Security Engineering159

      2.11 Activity List: Information Systems Security Engineering161

      2.12 Activity Attributes: Information Systems Security Engineering163

      2.13 Milestone List: Information Systems Security Engineering165

      2.14 Network Diagram: Information Systems Security Engineering167

      2.15 Activity Resource Requirements: Information Systems Security Engineering169

      2.16 Resource Breakdown Structure: Information Systems Security Engineering171

      2.17 Activity Duration Estimates: Information Systems Security Engineering173

      2.18 Duration Estimating Worksheet: Information Systems Security Engineering175

      2.19 Project Schedule: Information Systems Security Engineering177

      2.20 Cost Management Plan: Information Systems Security Engineering179

      2.21 Activity Cost Estimates: Information Systems Security Engineering181

      2.22 Cost Estimating Worksheet: Information Systems Security Engineering183

      2.23 Cost Baseline: Information Systems Security Engineering185

      2.24 Quality Management Plan: Information Systems Security Engineering187

      2.25 Quality Metrics: Information Systems Security Engineering189

      2.26 Process Improvement Plan: Information Systems Security Engineering191

      2.27 Responsibility Assignment Matrix: Information Systems Security Engineering193

      2.28 Roles and Responsibilities: Information Systems Security Engineering195

      2.29 Human Resource Management Plan: Information Systems Security Engineering197

      2.30 Communications Management Plan: Information Systems Security Engineering199

      2.31

Скачать книгу