Читать книгу Information Systems Security Engineering A Complete Guide - 2020 Edition - Gerardus Blokdyk - Страница 7

Оглавление

CRITERION #1: RECOGNIZE


INTENT: Be aware of the need for change. Recognize that there is an unfavorable variation, problem or symptom.

In my belief, the answer to this question is clearly defined:

5 Strongly Agree

4 Agree

3 Neutral

2 Disagree

1 Strongly Disagree

1. What do you need to start doing?

<--- Score

2. What are the stakeholder objectives to be achieved with Information systems security engineering?

<--- Score

3. What does Information systems security engineering success mean to the stakeholders?

<--- Score

4. Are employees recognized or rewarded for performance that demonstrates the highest levels of integrity?

<--- Score

5. What are the expected benefits of Information systems security engineering to the stakeholder?

<--- Score

6. Will Information systems security engineering deliverables need to be tested and, if so, by whom?

<--- Score

7. Who needs what information?

<--- Score

8. Are there regulatory / compliance issues?

<--- Score

9. What activities does the governance board need to consider?

<--- Score

10. How are training requirements identified?

<--- Score

11. Who needs to know about Information systems security engineering?

<--- Score

12. What Information systems security engineering events should you attend?

<--- Score

13. Are you dealing with any of the same issues today as yesterday? What can you do about this?

<--- Score

14. Are controls defined to recognize and contain problems?

<--- Score

15. Why is this needed?

<--- Score

16. How do you identify the kinds of information that you will need?

<--- Score

17. What are your needs in relation to Information systems security engineering skills, labor, equipment, and markets?

<--- Score

18. Which information does the Information systems security engineering business case need to include?

<--- Score

19. What is the extent or complexity of the Information systems security engineering problem?

<--- Score

20. Does Information systems security engineering create potential expectations in other areas that need to be recognized and considered?

<--- Score

21. When a Information systems security engineering manager recognizes a problem, what options are available?

<--- Score

22. How do you recognize an objection?

<--- Score

23. Consider your own Information systems security engineering project, what types of organizational problems do you think might be causing or affecting your problem, based on the work done so far?

<--- Score

24. Are losses recognized in a timely manner?

<--- Score

25. For your Information systems security engineering project, identify and describe the business environment, is there more than one layer to the business environment?

<--- Score

26. How much are sponsors, customers, partners, stakeholders involved in Information systems security engineering? In other words, what are the risks, if Information systems security engineering does not deliver successfully?

<--- Score

27. Do you need to avoid or amend any Information systems security engineering activities?

<--- Score

28. How are you going to measure success?

<--- Score

29. As a sponsor, customer or management, how important is it to meet goals, objectives?

<--- Score

30. To what extent does each concerned units management team recognize Information systems security engineering as an effective investment?

<--- Score

31. Did you miss any major Information systems security engineering issues?

<--- Score

32. Why the need?

<--- Score

33. What should be considered when identifying available resources, constraints, and deadlines?

<--- Score

34. Are problem definition and motivation clearly presented?

<--- Score

35. How do you identify subcontractor relationships?

<--- Score

36. What vendors make products that address the Information systems security engineering needs?

<--- Score

37. Have you identified your Information systems security engineering key performance indicators?

<--- Score

38. Are there any specific expectations or concerns about the Information systems security engineering team, Information systems security engineering itself?

<--- Score

39. Does the problem have ethical dimensions?

<--- Score

40. Are there Information systems security engineering problems defined?

<--- Score

41. Does your organization need more Information systems security engineering education?

<--- Score

42. Will new equipment/products be required to facilitate Information systems security engineering delivery, for example is new software needed?

<--- Score

43. What is the smallest subset of the problem you can usefully solve?

<--- Score

44. What are the clients issues and concerns?

<--- Score

45. What is the recognized need?

<--- Score

46. Think about the people you identified for your Information systems security engineering project and the project responsibilities you would assign to them, what kind of training do you think they would need to perform these responsibilities effectively?

<--- Score

47. What problems are you facing and how do you consider Information systems security engineering will circumvent those obstacles?

<--- Score

48. What information do users need?

<--- Score

49. What is the problem and/or vulnerability?

<--- Score

50. Who should resolve the Information systems security engineering issues?

<--- Score

51. What tools and technologies are needed for a custom Information systems security engineering project?

<--- Score

52. What needs to be done?

<--- Score

53. What would happen if Information systems security engineering weren’t done?

<--- Score

54. How can auditing be a preventative security measure?

<--- Score

55. What do employees need in the short term?

<--- Score

56. How does it fit into your organizational needs and tasks?

<--- Score

57. What are the minority interests and what amount of minority interests can be recognized?

<--- Score

58. Looking at each person individually – does every one have the qualities which are needed to work in this group?

<--- Score

59. What are the Information systems security engineering resources needed?

<--- Score

60. Is the quality assurance team identified?

<--- Score

61. What needs to stay?

<--- Score

62. Would you recognize a threat from the inside?

<--- Score

63. Will it solve real problems?

<--- Score

64. Do you know what you need to know about Information systems security engineering?

<--- Score

65. What Information systems security engineering capabilities do you need?

<--- Score

66. What extra resources will you need?

<--- Score

67. How are the Information systems security engineering’s objectives aligned to the group’s overall stakeholder strategy?

<--- Score

68. Do you have/need 24-hour access to key personnel?

<--- Score

69. Are there recognized Information systems security engineering problems?

<--- Score

70. Are employees recognized for desired behaviors?

<--- Score

71. Will a response program recognize when a crisis occurs and provide some level of response?

<--- Score

72. What resources or support might you need?

<--- Score

73. Who needs budgets?

<--- Score

74. Is the need for organizational change recognized?

<--- Score

75. What creative shifts do you need to take?

<--- Score

76. What situation(s) led to this Information systems security engineering Self Assessment?

<--- Score

77. How many trainings, in total, are needed?

<--- Score

78. To what extent would your organization benefit from being recognized as a award recipient?

<--- Score

79. Who defines the rules in relation to any given issue?

<--- Score

80. How do you assess your Information systems security engineering workforce capability and capacity needs, including skills, competencies, and staffing levels?

<--- Score

81. Who are your key stakeholders who need to sign off?

<--- Score

82. Do you need different information or graphics?

<--- Score

83. Who else hopes to benefit from it?

<--- Score

84. Whom do you really need or want to serve?

<--- Score

85. What else needs to be measured?

<--- Score

86. Is it needed?

<--- Score

87. What prevents you from making the changes you know will make you a more effective Information systems security engineering leader?

<--- Score

88. What Information systems security engineering problem should be solved?

<--- Score

89. What training and capacity building actions are needed to implement proposed reforms?

<--- Score

90. Can management personnel recognize the monetary benefit of Information systems security engineering?

<--- Score

91. Do you recognize Information systems security engineering achievements?

<--- Score

92. Which needs are not included or involved?

<--- Score

93. How do you recognize an Information systems security engineering objection?

<--- Score

94. Where is training needed?

<--- Score

95. Are there any revenue recognition issues?

<--- Score

96. What is the Information systems security engineering problem definition? What do you need to resolve?

<--- Score

97. What are the timeframes required to resolve each of the issues/problems?

<--- Score

98. Which issues are too important to ignore?

<--- Score

Add up total points for this section: _____ = Total points for this section

Divided by: ______ (number of statements answered) = ______ Average score for this section

Transfer your score to the Information systems security engineering Index at the beginning of the Self-Assessment.

Information Systems Security Engineering A Complete Guide - 2020 Edition

Подняться наверх