week12 - Week 12 ITC482 Computer Management Security...

Info icon This preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
ITC482 Computer Management & Security Week 12 Management of Information Security, 2nd ed. - Chapter 12 Slide 2 Learning Objectives Upon completion of this chapter, you should be able to: Understand basic project management Apply project management principles to an information security program Evaluate available project management tools
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Management of Information Security, 2nd ed. - Chapter 12 Slide 3 Introduction Information security is a process, not a project; however, each element of an information security program must be managed as a project, even if it is an ongoing one since information security is a continuous series, or chain, of projects Some aspects of information security are not project based; rather, they are managed processes (operations) Employers are seeking individuals that couple their information security focus and skills with strong project management skills Management of Information Security, 2nd ed. - Chapter 12 Slide 4 Figure 12-1 Position Posting
Image of page 2
Management of Information Security, 2nd ed. - Chapter 12 Slide 5 Figure 12-2 The Information Security Program Chain Management of Information Security, 2nd ed. - Chapter 12 Slide 6 Project Management The Guide to the Project Management Body of Knowledge defines project management as: The application of knowledge, skills, tools, and techniques to project activities to meet project requirements Project management is accomplished through the use of processes such as: initiating, planning, executing, controlling, and closing Project management involves the temporary assemblage resources to complete a project Some projects are iterative, and occur regularly
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Management of Information Security, 2nd ed. - Chapter 12 Slide 7 Project Management (continued) Benefits for organizations that make project management skills a priority include: Implementation of a methodology Improved planning Less ambiguity about roles Simplified project monitoring Early identification of deviations in quality, time, or budget In general, a project is deemed a success when: It is completed on time or early as compared to the baseline project plan It comes in at or below the expenditures planned for in the baseline budget It meets all specifications as outlined in the approved project definition, and the deliverables are accepted by the end user and/or assigning entity Management of Information Security, 2nd ed. - Chapter 12 Slide 8 Applying Project Management to Security In order to apply project management to information security, you must first identify an established project management methodology While other project management approaches exist, the PMBoK is considered the industry best practice
Image of page 4
Table 12-1 PMBoK Knowledge Areas Management of Information Security, 2nd ed. - Chapter 12 Slide 9 Management of Information Security, 2nd ed. - Chapter 12 Slide 10 Table 12-1 PMBoK Knowledge Areas (continued)
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Management of Information Security, 2nd ed. - Chapter 12 Slide 11 Project Integration Management
Image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern