Читать книгу IT Security Risk Assessment A Complete Guide - 2020 Edition - Gerardus Blokdyk - Страница 6

Оглавление

Table of Contents

About The Art of Service8

Included Resources - how to access8

Purpose of this Self-Assessment10

How to use the Self-Assessment11

IT Security Risk Assessment

Scorecard Example13

IT Security Risk Assessment

Scorecard14

BEGINNING OF THE

SELF-ASSESSMENT:15

CRITERION #1: RECOGNIZE16

CRITERION #2: DEFINE:27

CRITERION #3: MEASURE:43

CRITERION #4: ANALYZE:57

CRITERION #5: IMPROVE:73

CRITERION #6: CONTROL:90

CRITERION #7: SUSTAIN:102

IT Security Risk Assessment and Managing Projects, Criteria for Project Managers:126

1.0 Initiating Process Group: IT Security Risk Assessment127

1.1 Project Charter: IT Security Risk Assessment129

1.2 Stakeholder Register: IT Security Risk Assessment131

1.3 Stakeholder Analysis Matrix: IT Security Risk Assessment132

2.0 Planning Process Group: IT Security Risk Assessment134

2.1 Project Management Plan: IT Security Risk Assessment136

2.2 Scope Management Plan: IT Security Risk Assessment138

2.3 Requirements Management Plan: IT Security Risk Assessment140

2.4 Requirements Documentation: IT Security Risk Assessment142

2.5 Requirements Traceability Matrix: IT Security Risk Assessment144

2.6 Project Scope Statement: IT Security Risk Assessment146

2.7 Assumption and Constraint Log: IT Security Risk Assessment148

2.8 Work Breakdown Structure: IT Security Risk Assessment150

2.9 WBS Dictionary: IT Security Risk Assessment152

2.10 Schedule Management Plan: IT Security Risk Assessment155

2.11 Activity List: IT Security Risk Assessment157

2.12 Activity Attributes: IT Security Risk Assessment159

2.13 Milestone List: IT Security Risk Assessment161

2.14 Network Diagram: IT Security Risk Assessment163

2.15 Activity Resource Requirements: IT Security Risk Assessment165

2.16 Resource Breakdown Structure: IT Security Risk Assessment167

2.17 Activity Duration Estimates: IT Security Risk Assessment169

2.18 Duration Estimating Worksheet: IT Security Risk Assessment171

2.19 Project Schedule: IT Security Risk Assessment173

2.20 Cost Management Plan: IT Security Risk Assessment175

2.21 Activity Cost Estimates: IT Security Risk Assessment177

2.22 Cost Estimating Worksheet: IT Security Risk Assessment179

2.23 Cost Baseline: IT Security Risk Assessment181

2.24 Quality Management Plan: IT Security Risk Assessment183

2.25 Quality Metrics: IT Security Risk Assessment185

2.26 Process Improvement Plan: IT Security Risk Assessment187

2.27 Responsibility Assignment Matrix: IT Security Risk Assessment189

2.28 Roles and Responsibilities: IT Security Risk Assessment191

2.29 Human Resource Management Plan: IT Security Risk Assessment193

2.30 Communications Management Plan: IT Security Risk Assessment195

2.31 Risk Management Plan: IT Security Risk Assessment197

2.32 Risk Register: IT Security Risk Assessment199

2.33 Probability and Impact Assessment: IT Security Risk Assessment201

2.34 Probability and Impact Matrix: IT Security Risk Assessment203

2.35 Risk Data Sheet: IT Security Risk Assessment205

2.36 Procurement Management Plan: IT Security Risk Assessment207

2.37 Source Selection Criteria: IT Security Risk Assessment209

2.38 Stakeholder Management Plan: IT Security Risk Assessment211

2.39 Change Management Plan: IT Security Risk Assessment213

3.0 Executing Process Group: IT Security Risk Assessment215

3.1 Team Member Status Report: IT Security Risk Assessment217

3.2 Change Request: IT Security Risk Assessment219

3.3 Change Log: IT Security Risk Assessment221

3.4 Decision Log: IT Security Risk Assessment223

3.5 Quality Audit: IT Security Risk Assessment225

3.6 Team Directory: IT Security Risk Assessment228

3.7 Team Operating Agreement: IT Security Risk Assessment230

3.8 Team Performance Assessment: IT Security Risk Assessment232

3.9 Team Member Performance Assessment: IT Security Risk Assessment234

3.10 Issue Log: IT Security Risk Assessment236

4.0 Monitoring and Controlling Process Group: IT Security Risk Assessment238

4.1 Project Performance Report: IT Security Risk Assessment240

4.2 Variance Analysis: IT Security Risk Assessment242

4.3 Earned Value Status: IT Security Risk Assessment244

4.4 Risk Audit: IT Security Risk Assessment246

4.5 Contractor Status Report: IT Security Risk Assessment248

4.6 Formal Acceptance: IT Security Risk Assessment250

5.0 Closing Process Group: IT Security Risk Assessment252

5.1 Procurement Audit: IT Security Risk Assessment254

5.2 Contract Close-Out: IT Security Risk Assessment256

5.3 Project or Phase Close-Out: IT Security Risk Assessment258

5.4 Lessons Learned: IT Security Risk Assessment260

Index262

IT Security Risk Assessment A Complete Guide - 2020 Edition

Подняться наверх