Читать книгу Information Systems Security Engineering A Complete Guide - 2020 Edition - Gerardus Blokdyk - Страница 7
ОглавлениеCRITERION #1: RECOGNIZE
INTENT: Be aware of the need for change. Recognize that there is an unfavorable variation, problem or symptom.
In my belief, the answer to this question is clearly defined:
5 Strongly Agree
4 Agree
3 Neutral
2 Disagree
1 Strongly Disagree
1. What do you need to start doing?
<--- Score
2. What are the stakeholder objectives to be achieved with Information systems security engineering?
<--- Score
3. What does Information systems security engineering success mean to the stakeholders?
<--- Score
4. Are employees recognized or rewarded for performance that demonstrates the highest levels of integrity?
<--- Score
5. What are the expected benefits of Information systems security engineering to the stakeholder?
<--- Score
6. Will Information systems security engineering deliverables need to be tested and, if so, by whom?
<--- Score
7. Who needs what information?
<--- Score
8. Are there regulatory / compliance issues?
<--- Score
9. What activities does the governance board need to consider?
<--- Score
10. How are training requirements identified?
<--- Score
11. Who needs to know about Information systems security engineering?
<--- Score
12. What Information systems security engineering events should you attend?
<--- Score
13. Are you dealing with any of the same issues today as yesterday? What can you do about this?
<--- Score
14. Are controls defined to recognize and contain problems?
<--- Score
15. Why is this needed?
<--- Score
16. How do you identify the kinds of information that you will need?
<--- Score
17. What are your needs in relation to Information systems security engineering skills, labor, equipment, and markets?
<--- Score
18. Which information does the Information systems security engineering business case need to include?
<--- Score
19. What is the extent or complexity of the Information systems security engineering problem?
<--- Score
20. Does Information systems security engineering create potential expectations in other areas that need to be recognized and considered?
<--- Score
21. When a Information systems security engineering manager recognizes a problem, what options are available?
<--- Score
22. How do you recognize an objection?
<--- Score
23. Consider your own Information systems security engineering project, what types of organizational problems do you think might be causing or affecting your problem, based on the work done so far?
<--- Score
24. Are losses recognized in a timely manner?
<--- Score
25. For your Information systems security engineering project, identify and describe the business environment, is there more than one layer to the business environment?
<--- Score
26. How much are sponsors, customers, partners, stakeholders involved in Information systems security engineering? In other words, what are the risks, if Information systems security engineering does not deliver successfully?
<--- Score
27. Do you need to avoid or amend any Information systems security engineering activities?
<--- Score
28. How are you going to measure success?
<--- Score
29. As a sponsor, customer or management, how important is it to meet goals, objectives?
<--- Score
30. To what extent does each concerned units management team recognize Information systems security engineering as an effective investment?
<--- Score
31. Did you miss any major Information systems security engineering issues?
<--- Score
32. Why the need?
<--- Score
33. What should be considered when identifying available resources, constraints, and deadlines?
<--- Score
34. Are problem definition and motivation clearly presented?
<--- Score
35. How do you identify subcontractor relationships?
<--- Score
36. What vendors make products that address the Information systems security engineering needs?
<--- Score
37. Have you identified your Information systems security engineering key performance indicators?
<--- Score
38. Are there any specific expectations or concerns about the Information systems security engineering team, Information systems security engineering itself?
<--- Score
39. Does the problem have ethical dimensions?
<--- Score
40. Are there Information systems security engineering problems defined?
<--- Score
41. Does your organization need more Information systems security engineering education?
<--- Score
42. Will new equipment/products be required to facilitate Information systems security engineering delivery, for example is new software needed?
<--- Score
43. What is the smallest subset of the problem you can usefully solve?
<--- Score
44. What are the clients issues and concerns?
<--- Score
45. What is the recognized need?
<--- Score
46. Think about the people you identified for your Information systems security engineering project and the project responsibilities you would assign to them, what kind of training do you think they would need to perform these responsibilities effectively?
<--- Score
47. What problems are you facing and how do you consider Information systems security engineering will circumvent those obstacles?
<--- Score
48. What information do users need?
<--- Score
49. What is the problem and/or vulnerability?
<--- Score
50. Who should resolve the Information systems security engineering issues?
<--- Score
51. What tools and technologies are needed for a custom Information systems security engineering project?
<--- Score
52. What needs to be done?
<--- Score
53. What would happen if Information systems security engineering weren’t done?
<--- Score
54. How can auditing be a preventative security measure?
<--- Score
55. What do employees need in the short term?
<--- Score
56. How does it fit into your organizational needs and tasks?
<--- Score
57. What are the minority interests and what amount of minority interests can be recognized?
<--- Score
58. Looking at each person individually – does every one have the qualities which are needed to work in this group?
<--- Score
59. What are the Information systems security engineering resources needed?
<--- Score
60. Is the quality assurance team identified?
<--- Score
61. What needs to stay?
<--- Score
62. Would you recognize a threat from the inside?
<--- Score
63. Will it solve real problems?
<--- Score
64. Do you know what you need to know about Information systems security engineering?
<--- Score
65. What Information systems security engineering capabilities do you need?
<--- Score
66. What extra resources will you need?
<--- Score
67. How are the Information systems security engineering’s objectives aligned to the group’s overall stakeholder strategy?
<--- Score
68. Do you have/need 24-hour access to key personnel?
<--- Score
69. Are there recognized Information systems security engineering problems?
<--- Score
70. Are employees recognized for desired behaviors?
<--- Score
71. Will a response program recognize when a crisis occurs and provide some level of response?
<--- Score
72. What resources or support might you need?
<--- Score
73. Who needs budgets?
<--- Score
74. Is the need for organizational change recognized?
<--- Score
75. What creative shifts do you need to take?
<--- Score
76. What situation(s) led to this Information systems security engineering Self Assessment?
<--- Score
77. How many trainings, in total, are needed?
<--- Score
78. To what extent would your organization benefit from being recognized as a award recipient?
<--- Score
79. Who defines the rules in relation to any given issue?
<--- Score
80. How do you assess your Information systems security engineering workforce capability and capacity needs, including skills, competencies, and staffing levels?
<--- Score
81. Who are your key stakeholders who need to sign off?
<--- Score
82. Do you need different information or graphics?
<--- Score
83. Who else hopes to benefit from it?
<--- Score
84. Whom do you really need or want to serve?
<--- Score
85. What else needs to be measured?
<--- Score
86. Is it needed?
<--- Score
87. What prevents you from making the changes you know will make you a more effective Information systems security engineering leader?
<--- Score
88. What Information systems security engineering problem should be solved?
<--- Score
89. What training and capacity building actions are needed to implement proposed reforms?
<--- Score
90. Can management personnel recognize the monetary benefit of Information systems security engineering?
<--- Score
91. Do you recognize Information systems security engineering achievements?
<--- Score
92. Which needs are not included or involved?
<--- Score
93. How do you recognize an Information systems security engineering objection?
<--- Score
94. Where is training needed?
<--- Score
95. Are there any revenue recognition issues?
<--- Score
96. What is the Information systems security engineering problem definition? What do you need to resolve?
<--- Score
97. What are the timeframes required to resolve each of the issues/problems?
<--- Score
98. Which issues are too important to ignore?
<--- Score
Add up total points for this section: _____ = Total points for this section
Divided by: ______ (number of statements answered) = ______ Average score for this section
Transfer your score to the Information systems security engineering Index at the beginning of the Self-Assessment.