chapter-10 - Class Schedule Administrative Lecture (...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Class Schedule Administrative Physical Security- Warehouse Project Exam 04 Principles of Information Security, 2nd Edition 2
Background image of page 2
Principles of Information Security, 2nd Edition 3 Learning Objectives Upon completion of this material, you should be able to: Understand Project Management and SDLC terminology and concepts Understand the numerous components and organizational considerations that must be addressed by a project plan Appreciate the significance of the project manager’s role in the success of an information security project
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 2nd Edition 4 Learning Objectives (continued) Identify the nontechnical problems that organizations face in managing cross functional projects Differentiate between Certification vs Accreditation Understand the Federal Security Certification and Accreditation Phases Recognize the importance of following PMBOK, SDLC, methods and sound technical strategies
Background image of page 4
Principles of Information Security, 2nd Edition 5 Introduction Security SDLC is constantly changing based on the period risk/threat assessments requiring changes to configuration and operation of organization’s information systems and associated governance frameworks. Conducting security risk-vulnerability assessments, implementing counter measures, and establishing an enterprise information security blueprint requires concrete project planning and execution.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 2nd Edition 6 The Need for Project Management Project management requires unique set of skills and thorough understanding of a broad body of specialized knowledge Most information security projects require trained project manager (a CISO) or skilled IT manager versed in project management techniques Project Life Cycle Phases : Initiation, Planning, Execution, Control and Monitoring, Close-out Project Governance : Communications Plan, Change Management (CCB), Steering Team, Quality Plan, Risk/Issues Management Project Triangle : Schedule, Budget, and Performance (Expectations)
Background image of page 6
Project Life Cycle and SDLC Principles of Information Security, 2nd Edition 7 ARB 1 ARB 2 ARB 3 ARB 4 Initiation Planning Feasibility Requirements Design GSD…………………. .……. ..DSD Development Test Implementation Execution Close-Out High Level Estimates High Level Requirements Business Case Business Review Board Communities of Practice Project Charter Project Life Cycle Systems Development Life Cycle Product Warranty Period Project Plan
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 2nd Edition 8 Project Management for Information Security Once organization’s vision and objectives are understood, process for creating project plan can be defined Two critical steps in establishing project are: Initiating the project Planning the project Each organization must define a standard portfolio and project management methodology for IT and information security projects
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/15/2012 for the course CIS CIS120 taught by Professor Zales during the Spring '12 term at Harrisburg Area Community College.

Page1 / 32

chapter-10 - Class Schedule Administrative Lecture (...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online