Название | Information Technology Security Risk Assessment A Complete Guide - 2020 Edition |
---|---|
Автор произведения | Gerardus Blokdyk |
Жанр | Зарубежная деловая литература |
Серия | |
Издательство | Зарубежная деловая литература |
Год выпуска | 0 |
isbn | 9781867460299 |
Your completed Information Technology Security Risk Assessment Scorecard will give you a clear presentation of which Information Technology Security Risk Assessment areas need attention.
Information Technology Security Risk Assessment
Scorecard Example
Example of how the finalized Scorecard can look like:
Information Technology Security Risk Assessment
Scorecard
Your Scores:
BEGINNING OF THE
SELF-ASSESSMENT:
Table of Contents
About The Art of Service8
Included Resources - how to access8
Purpose of this Self-Assessment10
How to use the Self-Assessment11
Information Technology Security Risk Assessment
Scorecard Example13
Information Technology Security Risk Assessment
Scorecard14
BEGINNING OF THE
SELF-ASSESSMENT:15
CRITERION #1: RECOGNIZE16
CRITERION #2: DEFINE:29
CRITERION #3: MEASURE:45
CRITERION #4: ANALYZE:60
CRITERION #5: IMPROVE:77
CRITERION #6: CONTROL:94
CRITERION #7: SUSTAIN:107
Information Technology Security Risk Assessment and Managing Projects, Criteria for Project Managers:133
1.0 Initiating Process Group: Information Technology Security Risk Assessment134
1.1 Project Charter: Information Technology Security Risk Assessment136
1.2 Stakeholder Register: Information Technology Security Risk Assessment138
1.3 Stakeholder Analysis Matrix: Information Technology Security Risk Assessment139
2.0 Planning Process Group: Information Technology Security Risk Assessment141
2.1 Project Management Plan: Information Technology Security Risk Assessment144
2.2 Scope Management Plan: Information Technology Security Risk Assessment146
2.3 Requirements Management Plan: Information Technology Security Risk Assessment148
2.4 Requirements Documentation: Information Technology Security Risk Assessment150
2.5 Requirements Traceability Matrix: Information Technology Security Risk Assessment152
2.6 Project Scope Statement: Information Technology Security Risk Assessment154
2.7 Assumption and Constraint Log: Information Technology Security Risk Assessment156
2.8 Work Breakdown Structure: Information Technology Security Risk Assessment159
2.9 WBS Dictionary: Information Technology Security Risk Assessment161
2.10 Schedule Management Plan: Information Technology Security Risk Assessment163
2.11 Activity List: Information Technology Security Risk Assessment165
2.12 Activity Attributes: Information Technology Security Risk Assessment167
2.13 Milestone List: Information Technology Security Risk Assessment169
2.14 Network Diagram: Information Technology Security Risk Assessment171
2.15 Activity Resource Requirements: Information Technology Security Risk Assessment173
2.16 Resource Breakdown Structure: Information Technology Security Risk Assessment175
2.17 Activity Duration Estimates: Information Technology Security Risk Assessment177
2.18 Duration Estimating Worksheet: Information Technology Security Risk Assessment180
2.19 Project Schedule: Information Technology Security Risk Assessment182
2.20 Cost Management Plan: Information Technology Security Risk Assessment184
2.21 Activity Cost Estimates: Information Technology Security Risk Assessment186
2.22 Cost Estimating Worksheet: Information Technology Security Risk Assessment188
2.23 Cost Baseline: Information Technology Security Risk Assessment190
2.24 Quality Management Plan: Information Technology Security Risk Assessment192
2.25 Quality Metrics: Information Technology Security Risk Assessment194
2.26 Process Improvement Plan: Information Technology Security Risk Assessment196
2.27 Responsibility Assignment Matrix: Information Technology Security Risk Assessment198
2.28 Roles and Responsibilities: Information Technology Security Risk Assessment200
2.29 Human Resource Management Plan: Information Technology Security Risk Assessment202
2.30 Communications Management Plan: Information Technology Security Risk Assessment204
2.31 Risk Management Plan: Information Technology Security Risk Assessment206
2.32 Risk Register: Information Technology Security Risk Assessment208
2.33 Probability and Impact Assessment: Information Technology Security Risk Assessment210
2.34 Probability and Impact Matrix: Information Technology Security Risk Assessment212
2.35 Risk Data Sheet: Information Technology Security Risk Assessment214
2.36 Procurement Management Plan: Information Technology Security Risk Assessment216
2.37 Source Selection Criteria: Information Technology Security Risk Assessment218
2.38 Stakeholder Management Plan: Information Technology Security Risk Assessment220
2.39 Change Management Plan: Information Technology Security Risk Assessment222
3.0 Executing Process Group: Information Technology Security Risk Assessment224
3.1 Team Member Status Report: Information Technology Security Risk Assessment226
3.2 Change Request: Information Technology Security Risk Assessment228
3.3 Change Log: Information Technology Security Risk Assessment230
3.4 Decision Log: Information Technology Security Risk Assessment232
3.5 Quality Audit: Information Technology Security Risk Assessment234
3.6 Team Directory: Information Technology Security Risk Assessment237
3.7 Team Operating Agreement: Information Technology Security Risk Assessment239
3.8 Team Performance Assessment: Information Technology Security Risk Assessment241
3.9 Team Member Performance Assessment: Information Technology Security Risk Assessment244
3.10 Issue Log: Information Technology Security Risk Assessment246
4.0 Monitoring and Controlling