Читать книгу Information Systems Security Engineering A Complete Guide - 2020 Edition - Gerardus Blokdyk - Страница 6

Оглавление

Table of Contents

About The Art of Service8

Included Resources - how to access8

Purpose of this Self-Assessment10

How to use the Self-Assessment11

Information Systems Security Engineering

Scorecard Example13

Information Systems Security Engineering

Scorecard14

BEGINNING OF THE

SELF-ASSESSMENT:15

CRITERION #1: RECOGNIZE16

CRITERION #2: DEFINE:28

CRITERION #3: MEASURE:44

CRITERION #4: ANALYZE:59

CRITERION #5: IMPROVE:75

CRITERION #6: CONTROL:92

CRITERION #7: SUSTAIN:104

Information Systems Security Engineering and Managing Projects, Criteria for Project Managers:130

1.0 Initiating Process Group: Information Systems Security Engineering131

1.1 Project Charter: Information Systems Security Engineering133

1.2 Stakeholder Register: Information Systems Security Engineering135

1.3 Stakeholder Analysis Matrix: Information Systems Security Engineering136

2.0 Planning Process Group: Information Systems Security Engineering138

2.1 Project Management Plan: Information Systems Security Engineering140

2.2 Scope Management Plan: Information Systems Security Engineering142

2.3 Requirements Management Plan: Information Systems Security Engineering144

2.4 Requirements Documentation: Information Systems Security Engineering146

2.5 Requirements Traceability Matrix: Information Systems Security Engineering148

2.6 Project Scope Statement: Information Systems Security Engineering150

2.7 Assumption and Constraint Log: Information Systems Security Engineering152

2.8 Work Breakdown Structure: Information Systems Security Engineering154

2.9 WBS Dictionary: Information Systems Security Engineering156

2.10 Schedule Management Plan: Information Systems Security Engineering159

2.11 Activity List: Information Systems Security Engineering161

2.12 Activity Attributes: Information Systems Security Engineering163

2.13 Milestone List: Information Systems Security Engineering165

2.14 Network Diagram: Information Systems Security Engineering167

2.15 Activity Resource Requirements: Information Systems Security Engineering169

2.16 Resource Breakdown Structure: Information Systems Security Engineering171

2.17 Activity Duration Estimates: Information Systems Security Engineering173

2.18 Duration Estimating Worksheet: Information Systems Security Engineering175

2.19 Project Schedule: Information Systems Security Engineering177

2.20 Cost Management Plan: Information Systems Security Engineering179

2.21 Activity Cost Estimates: Information Systems Security Engineering181

2.22 Cost Estimating Worksheet: Information Systems Security Engineering183

2.23 Cost Baseline: Information Systems Security Engineering185

2.24 Quality Management Plan: Information Systems Security Engineering187

2.25 Quality Metrics: Information Systems Security Engineering189

2.26 Process Improvement Plan: Information Systems Security Engineering191

2.27 Responsibility Assignment Matrix: Information Systems Security Engineering193

2.28 Roles and Responsibilities: Information Systems Security Engineering195

2.29 Human Resource Management Plan: Information Systems Security Engineering197

2.30 Communications Management Plan: Information Systems Security Engineering199

2.31 Risk Management Plan: Information Systems Security Engineering201

2.32 Risk Register: Information Systems Security Engineering203

2.33 Probability and Impact Assessment: Information Systems Security Engineering205

2.34 Probability and Impact Matrix: Information Systems Security Engineering207

2.35 Risk Data Sheet: Information Systems Security Engineering209

2.36 Procurement Management Plan: Information Systems Security Engineering211

2.37 Source Selection Criteria: Information Systems Security Engineering213

2.38 Stakeholder Management Plan: Information Systems Security Engineering215

2.39 Change Management Plan: Information Systems Security Engineering217

3.0 Executing Process Group: Information Systems Security Engineering219

3.1 Team Member Status Report: Information Systems Security Engineering221

3.2 Change Request: Information Systems Security Engineering223

3.3 Change Log: Information Systems Security Engineering225

3.4 Decision Log: Information Systems Security Engineering227

3.5 Quality Audit: Information Systems Security Engineering229

3.6 Team Directory: Information Systems Security Engineering232

3.7 Team Operating Agreement: Information Systems Security Engineering234

3.8 Team Performance Assessment: Information Systems Security Engineering236

3.9 Team Member Performance Assessment: Information Systems Security Engineering238

3.10 Issue Log: Information Systems Security Engineering240

4.0 Monitoring and Controlling Process Group: Information Systems Security Engineering242

4.1 Project Performance Report: Information Systems Security Engineering244

4.2 Variance Analysis: Information Systems Security Engineering246

4.3 Earned Value Status: Information Systems Security Engineering248

4.4 Risk Audit: Information Systems Security Engineering250

4.5 Contractor Status Report: Information Systems Security Engineering252

4.6 Formal Acceptance: Information Systems Security Engineering254

5.0 Closing Process Group: Information Systems Security Engineering256

5.1 Procurement Audit: Information Systems Security Engineering258

5.2 Contract Close-Out: Information Systems Security Engineering260

5.3 Project or Phase Close-Out: Information Systems Security Engineering262

5.4 Lessons Learned: Information Systems Security Engineering264

Index266

Information Systems Security Engineering A Complete Guide - 2020 Edition

Подняться наверх