Читать книгу Information Technology Security Risk Assessment A Complete Guide - 2020 Edition - Gerardus Blokdyk - Страница 6

Оглавление

Table of Contents

About The Art of Service8

Included Resources - how to access8

Purpose of this Self-Assessment10

How to use the Self-Assessment11

Information Technology Security Risk Assessment

Scorecard Example13

Information Technology Security Risk Assessment

Scorecard14

BEGINNING OF THE

SELF-ASSESSMENT:15

CRITERION #1: RECOGNIZE16

CRITERION #2: DEFINE:29

CRITERION #3: MEASURE:45

CRITERION #4: ANALYZE:60

CRITERION #5: IMPROVE:77

CRITERION #6: CONTROL:94

CRITERION #7: SUSTAIN:107

Information Technology Security Risk Assessment and Managing Projects, Criteria for Project Managers:133

1.0 Initiating Process Group: Information Technology Security Risk Assessment134

1.1 Project Charter: Information Technology Security Risk Assessment136

1.2 Stakeholder Register: Information Technology Security Risk Assessment138

1.3 Stakeholder Analysis Matrix: Information Technology Security Risk Assessment139

2.0 Planning Process Group: Information Technology Security Risk Assessment141

2.1 Project Management Plan: Information Technology Security Risk Assessment144

2.2 Scope Management Plan: Information Technology Security Risk Assessment146

2.3 Requirements Management Plan: Information Technology Security Risk Assessment148

2.4 Requirements Documentation: Information Technology Security Risk Assessment150

2.5 Requirements Traceability Matrix: Information Technology Security Risk Assessment152

2.6 Project Scope Statement: Information Technology Security Risk Assessment154

2.7 Assumption and Constraint Log: Information Technology Security Risk Assessment156

2.8 Work Breakdown Structure: Information Technology Security Risk Assessment159

2.9 WBS Dictionary: Information Technology Security Risk Assessment161

2.10 Schedule Management Plan: Information Technology Security Risk Assessment163

2.11 Activity List: Information Technology Security Risk Assessment165

2.12 Activity Attributes: Information Technology Security Risk Assessment167

2.13 Milestone List: Information Technology Security Risk Assessment169

2.14 Network Diagram: Information Technology Security Risk Assessment171

2.15 Activity Resource Requirements: Information Technology Security Risk Assessment173

2.16 Resource Breakdown Structure: Information Technology Security Risk Assessment175

2.17 Activity Duration Estimates: Information Technology Security Risk Assessment177

2.18 Duration Estimating Worksheet: Information Technology Security Risk Assessment180

2.19 Project Schedule: Information Technology Security Risk Assessment182

2.20 Cost Management Plan: Information Technology Security Risk Assessment184

2.21 Activity Cost Estimates: Information Technology Security Risk Assessment186

2.22 Cost Estimating Worksheet: Information Technology Security Risk Assessment188

2.23 Cost Baseline: Information Technology Security Risk Assessment190

2.24 Quality Management Plan: Information Technology Security Risk Assessment192

2.25 Quality Metrics: Information Technology Security Risk Assessment194

2.26 Process Improvement Plan: Information Technology Security Risk Assessment196

2.27 Responsibility Assignment Matrix: Information Technology Security Risk Assessment198

2.28 Roles and Responsibilities: Information Technology Security Risk Assessment200

2.29 Human Resource Management Plan: Information Technology Security Risk Assessment202

2.30 Communications Management Plan: Information Technology Security Risk Assessment204

2.31 Risk Management Plan: Information Technology Security Risk Assessment206

2.32 Risk Register: Information Technology Security Risk Assessment208

2.33 Probability and Impact Assessment: Information Technology Security Risk Assessment210

2.34 Probability and Impact Matrix: Information Technology Security Risk Assessment212

2.35 Risk Data Sheet: Information Technology Security Risk Assessment214

2.36 Procurement Management Plan: Information Technology Security Risk Assessment216

2.37 Source Selection Criteria: Information Technology Security Risk Assessment218

2.38 Stakeholder Management Plan: Information Technology Security Risk Assessment220

2.39 Change Management Plan: Information Technology Security Risk Assessment222

3.0 Executing Process Group: Information Technology Security Risk Assessment224

3.1 Team Member Status Report: Information Technology Security Risk Assessment226

3.2 Change Request: Information Technology Security Risk Assessment228

3.3 Change Log: Information Technology Security Risk Assessment230

3.4 Decision Log: Information Technology Security Risk Assessment232

3.5 Quality Audit: Information Technology Security Risk Assessment234

3.6 Team Directory: Information Technology Security Risk Assessment237

3.7 Team Operating Agreement: Information Technology Security Risk Assessment239

3.8 Team Performance Assessment: Information Technology Security Risk Assessment241

3.9 Team Member Performance Assessment: Information Technology Security Risk Assessment244

3.10 Issue Log: Information Technology Security Risk Assessment246

4.0 Monitoring and Controlling Process Group: Information Technology Security Risk Assessment248

4.1 Project Performance Report: Information Technology Security Risk Assessment250

4.2 Variance Analysis: Information Technology Security Risk Assessment252

4.3 Earned Value Status: Information Technology Security Risk Assessment254

4.4 Risk Audit: Information Technology Security Risk Assessment256

4.5 Contractor Status Report: Information Technology Security Risk Assessment258

4.6 Formal Acceptance: Information Technology Security Risk Assessment260

5.0 Closing Process Group: Information Technology Security Risk Assessment262

5.1 Procurement Audit: Information Technology Security Risk Assessment264

5.2 Contract Close-Out: Information Technology Security Risk Assessment266

5.3 Project or Phase Close-Out: Information Technology Security Risk Assessment268

5.4 Lessons Learned: Information Technology Security Risk Assessment270

Index272

Information Technology Security Risk Assessment A Complete Guide - 2020 Edition

Подняться наверх