IT Security Risk Assessment A Complete Guide - 2020 Edition. Gerardus Blokdyk. Читать онлайн. Newlib. NEWLIB.NET

Автор: Gerardus Blokdyk
Издательство: Ingram
Серия:
Жанр произведения: Зарубежная деловая литература
Год издания: 0
isbn: 9781867461388
Скачать книгу
and round to the nearest tenth. Then transfer to the corresponding spoke in the IT Security Risk Assessment Scorecard on the second next page of the Self-Assessment.

      Your completed IT Security Risk Assessment Scorecard will give you a clear presentation of which IT Security Risk Assessment areas need attention.

      IT Security Risk Assessment

      Scorecard Example

      Example of how the finalized Scorecard can look like:

      IT Security Risk Assessment

      Scorecard

      Your Scores:

      BEGINNING OF THE

      SELF-ASSESSMENT:

      Table of Contents

      About The Art of Service8

      Included Resources - how to access8

      Purpose of this Self-Assessment10

      How to use the Self-Assessment11

      IT Security Risk Assessment

      Scorecard Example13

      IT Security Risk Assessment

      Scorecard14

      BEGINNING OF THE

      SELF-ASSESSMENT:15

      CRITERION #1: RECOGNIZE16

      CRITERION #2: DEFINE:27

      CRITERION #3: MEASURE:43

      CRITERION #4: ANALYZE:57

      CRITERION #5: IMPROVE:73

      CRITERION #6: CONTROL:90

      CRITERION #7: SUSTAIN:102

      IT Security Risk Assessment and Managing Projects, Criteria for Project Managers:126

      1.0 Initiating Process Group: IT Security Risk Assessment127

      1.1 Project Charter: IT Security Risk Assessment129

      1.2 Stakeholder Register: IT Security Risk Assessment131

      1.3 Stakeholder Analysis Matrix: IT Security Risk Assessment132

      2.0 Planning Process Group: IT Security Risk Assessment134

      2.1 Project Management Plan: IT Security Risk Assessment136

      2.2 Scope Management Plan: IT Security Risk Assessment138

      2.3 Requirements Management Plan: IT Security Risk Assessment140

      2.4 Requirements Documentation: IT Security Risk Assessment142

      2.5 Requirements Traceability Matrix: IT Security Risk Assessment144

      2.6 Project Scope Statement: IT Security Risk Assessment146

      2.7 Assumption and Constraint Log: IT Security Risk Assessment148

      2.8 Work Breakdown Structure: IT Security Risk Assessment150

      2.9 WBS Dictionary: IT Security Risk Assessment152

      2.10 Schedule Management Plan: IT Security Risk Assessment155

      2.11 Activity List: IT Security Risk Assessment157

      2.12 Activity Attributes: IT Security Risk Assessment159

      2.13 Milestone List: IT Security Risk Assessment161

      2.14 Network Diagram: IT Security Risk Assessment163

      2.15 Activity Resource Requirements: IT Security Risk Assessment165

      2.16 Resource Breakdown Structure: IT Security Risk Assessment167

      2.17 Activity Duration Estimates: IT Security Risk Assessment169

      2.18 Duration Estimating Worksheet: IT Security Risk Assessment171

      2.19 Project Schedule: IT Security Risk Assessment173

      2.20 Cost Management Plan: IT Security Risk Assessment175

      2.21 Activity Cost Estimates: IT Security Risk Assessment177

      2.22 Cost Estimating Worksheet: IT Security Risk Assessment179

      2.23 Cost Baseline: IT Security Risk Assessment181

      2.24 Quality Management Plan: IT Security Risk Assessment183

      2.25 Quality Metrics: IT Security Risk Assessment185

      2.26 Process Improvement Plan: IT Security Risk Assessment187

      2.27 Responsibility Assignment Matrix: IT Security Risk Assessment189

      2.28 Roles and Responsibilities: IT Security Risk Assessment191

      2.29 Human Resource Management Plan: IT Security Risk Assessment193

      2.30 Communications Management Plan: IT Security Risk Assessment195

      2.31 Risk Management Plan: IT Security Risk Assessment197

      2.32 Risk Register: IT Security Risk Assessment199

      2.33 Probability and Impact Assessment: IT Security Risk Assessment201

      2.34 Probability and Impact Matrix: IT Security Risk Assessment203

      2.35 Risk Data Sheet: IT Security Risk Assessment205

      2.36 Procurement Management Plan: IT Security Risk Assessment207

      2.37 Source Selection Criteria: IT Security Risk Assessment209

      2.38 Stakeholder Management Plan: IT Security Risk Assessment211

      2.39 Change Management Plan: IT Security Risk Assessment213

      3.0 Executing Process Group: IT Security Risk Assessment215

      3.1 Team Member Status Report: IT Security Risk Assessment217

      3.2 Change Request: IT Security Risk Assessment219

      3.3 Change Log: IT Security Risk Assessment221

      3.4 Decision Log: IT Security Risk Assessment223

      3.5 Quality Audit: IT Security Risk Assessment225

      3.6 Team Directory: IT Security Risk Assessment228

      3.7 Team Operating Agreement: IT Security Risk Assessment230

      3.8 Team Performance Assessment: IT Security Risk Assessment232

      3.9 Team Member Performance Assessment: IT Security Risk Assessment234

      3.10 Issue Log: IT Security Risk Assessment236

      4.0 Monitoring and Controlling Process Group: IT Security Risk Assessment238

      4.1 Project Performance Report: IT Security Risk Assessment240

      4.2 Variance Analysis: IT Security Risk Assessment242

      4.3 Earned Value Status: IT Security Risk Assessment244

      4.4 Risk Audit: IT Security Risk Assessment246

      4.5 Contractor Status Report: IT Security Risk Assessment248

      4.6 Formal Acceptance: IT Security Risk Assessment250

      5.0 Closing Process Group: IT Security Risk Assessment252

      5.1 Procurement Audit: IT Security Risk Assessment254

      5.2 Contract Close-Out: IT Security Risk Assessment256

      5.3 Project or Phase Close-Out: IT Security Risk Assessment258

      5.4 Lessons Learned: IT Security Risk Assessment260

      Index262

      CRITERION #1: RECOGNIZE

      INTENT: Be aware of the need for change. Recognize that there is an