Название | Information Systems Security Engineering A Complete Guide - 2020 Edition |
---|---|
Автор произведения | Gerardus Blokdyk |
Жанр | Зарубежная деловая литература |
Серия | |
Издательство | Зарубежная деловая литература |
Год выпуска | 0 |
isbn | 9781867459149 |
Your completed Information Systems Security Engineering Scorecard will give you a clear presentation of which Information Systems Security Engineering areas need attention.
Information Systems Security Engineering
Scorecard Example
Example of how the finalized Scorecard can look like:
Information Systems Security Engineering
Scorecard
Your Scores:
BEGINNING OF THE
SELF-ASSESSMENT:
Table of Contents
About The Art of Service8
Included Resources - how to access8
Purpose of this Self-Assessment10
How to use the Self-Assessment11
Information Systems Security Engineering
Scorecard Example13
Information Systems Security Engineering
Scorecard14
BEGINNING OF THE
SELF-ASSESSMENT:15
CRITERION #1: RECOGNIZE16
CRITERION #2: DEFINE:28
CRITERION #3: MEASURE:44
CRITERION #4: ANALYZE:59
CRITERION #5: IMPROVE:75
CRITERION #6: CONTROL:92
CRITERION #7: SUSTAIN:104
Information Systems Security Engineering and Managing Projects, Criteria for Project Managers:130
1.0 Initiating Process Group: Information Systems Security Engineering131
1.1 Project Charter: Information Systems Security Engineering133
1.2 Stakeholder Register: Information Systems Security Engineering135
1.3 Stakeholder Analysis Matrix: Information Systems Security Engineering136
2.0 Planning Process Group: Information Systems Security Engineering138
2.1 Project Management Plan: Information Systems Security Engineering140
2.2 Scope Management Plan: Information Systems Security Engineering142
2.3 Requirements Management Plan: Information Systems Security Engineering144
2.4 Requirements Documentation: Information Systems Security Engineering146
2.5 Requirements Traceability Matrix: Information Systems Security Engineering148
2.6 Project Scope Statement: Information Systems Security Engineering150
2.7 Assumption and Constraint Log: Information Systems Security Engineering152
2.8 Work Breakdown Structure: Information Systems Security Engineering154
2.9 WBS Dictionary: Information Systems Security Engineering156
2.10 Schedule Management Plan: Information Systems Security Engineering159
2.11 Activity List: Information Systems Security Engineering161
2.12 Activity Attributes: Information Systems Security Engineering163
2.13 Milestone List: Information Systems Security Engineering165
2.14 Network Diagram: Information Systems Security Engineering167
2.15 Activity Resource Requirements: Information Systems Security Engineering169
2.16 Resource Breakdown Structure: Information Systems Security Engineering171
2.17 Activity Duration Estimates: Information Systems Security Engineering173
2.18 Duration Estimating Worksheet: Information Systems Security Engineering175
2.19 Project Schedule: Information Systems Security Engineering177
2.20 Cost Management Plan: Information Systems Security Engineering179
2.21 Activity Cost Estimates: Information Systems Security Engineering181
2.22 Cost Estimating Worksheet: Information Systems Security Engineering183
2.23 Cost Baseline: Information Systems Security Engineering185
2.24 Quality Management Plan: Information Systems Security Engineering187
2.25 Quality Metrics: Information Systems Security Engineering189
2.26 Process Improvement Plan: Information Systems Security Engineering191
2.27 Responsibility Assignment Matrix: Information Systems Security Engineering193
2.28 Roles and Responsibilities: Information Systems Security Engineering195
2.29 Human Resource Management Plan: Information Systems Security Engineering197
2.30 Communications Management Plan: Information Systems Security Engineering199
2.31 Risk Management Plan: Information Systems Security Engineering201
2.32 Risk Register: Information Systems Security Engineering203
2.33 Probability and Impact Assessment: Information Systems Security Engineering205
2.34 Probability and Impact Matrix: Information Systems Security Engineering207
2.35 Risk Data Sheet: Information Systems Security Engineering209
2.36 Procurement Management Plan: Information Systems Security Engineering211
2.37 Source Selection Criteria: Information Systems Security Engineering213
2.38 Stakeholder Management Plan: Information Systems Security Engineering215
2.39 Change Management Plan: Information Systems Security Engineering217
3.0 Executing Process Group: Information Systems Security Engineering219
3.1 Team Member Status Report: Information Systems Security Engineering221
3.2 Change Request: Information Systems Security Engineering223
3.3 Change Log: Information Systems Security Engineering225
3.4 Decision Log: Information Systems Security Engineering227
3.5 Quality Audit: Information Systems Security Engineering229
3.6 Team Directory: Information Systems Security Engineering232
3.7 Team Operating Agreement: Information Systems Security Engineering234
3.8 Team Performance Assessment: Information Systems Security Engineering236
3.9 Team Member Performance Assessment: Information Systems Security Engineering238
3.10 Issue Log: Information Systems Security Engineering240
4.0 Monitoring and Controlling Process Group: Information Systems Security Engineering242
4.1 Project Performance Report: Information Systems Security Engineering244
4.2 Variance Analysis: Information Systems Security Engineering246
4.3 Earned Value Status: Information Systems Security Engineering248
4.4 Risk Audit: Information Systems Security