week12 - Week 12 ITC482 Computer Management Security...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
ITC482 Computer Management & Security Week 12 Management of Information Security, 2nd ed. - Chapter 12 Slide 2 Learning Objectives Upon completion of this chapter, you should be able to: Understand basic project management Apply project management principles to an information security program Evaluate available project management tools
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Management of Information Security, 2nd ed. - Chapter 12 Slide 3 Introduction Information security is a process, not a project; however, each element of an information security program must be managed as a project, even if it is an ongoing one since information security is a continuous series, or chain, of projects Some aspects of information security are not project based; rather, they are managed processes (operations) Employers are seeking individuals that couple their information security focus and skills with strong project management skills Management of Information Security, 2nd ed. - Chapter 12 Slide 4 Figure 12-1 Position Posting
Background image of page 2
Management of Information Security, 2nd ed. - Chapter 12 Slide 5 Figure 12-2 The Information Security Program Chain Management of Information Security, 2nd ed. - Chapter 12 Slide 6 Project Management The Guide to the Project Management Body of Knowledge defines project management as: The application of knowledge, skills, tools, and techniques to project activities to meet project requirements Project management is accomplished through the use of processes such as: initiating, planning, executing, controlling, and closing Project management involves the temporary assemblage resources to complete a project Some projects are iterative, and occur regularly
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Management of Information Security, 2nd ed. - Chapter 12 Slide 7 Project Management (continued) Benefits for organizations that make project management skills a priority include: Implementation of a methodology Improved planning Less ambiguity about roles Simplified project monitoring Early identification of deviations in quality, time, or budget In general, a project is deemed a success when: It is completed on time or early as compared to the baseline project plan It comes in at or below the expenditures planned for in the baseline budget It meets all specifications as outlined in the approved project definition, and the deliverables are accepted by the end user and/or assigning entity Management of Information Security, 2nd ed. - Chapter 12 Slide 8 Applying Project Management to Security In order to apply project management to information security, you must first identify an established project management methodology While other project management approaches exist, the PMBoK is considered the industry best practice
Background image of page 4
Table 12-1 PMBoK Knowledge Areas Management of Information Security, 2nd ed. - Chapter 12 Slide 9 Management of Information Security, 2nd ed. - Chapter 12 Slide 10 Table 12-1 PMBoK Knowledge Areas (continued)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Management of Information Security, 2nd ed. - Chapter 12
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/15/2010 for the course ITC 594 taught by Professor Peterdalmaris during the Three '10 term at Charles Sturt University.

Page1 / 31

week12 - Week 12 ITC482 Computer Management Security...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online