CHAPTER 7: Info Security Project Management

Get Started. It's Free
or sign up with your email address
CHAPTER 7: Info Security Project Management by Mind Map: CHAPTER 7: Info Security Project Management

1. ○ Easy to read and understand; easy to present to management ○ Easier to design and implement than the PERT diagrams, yielding much of the same information ○ Able to lists activities on the vertical axis of a bar chart, and provides a simple timeline on the horizontal axis

2. ● Gantt

3. ● PERT

4. Ensures that a project is completed within the resource constraints

4.1. Includes: -Resource planning -Cost estimating -Cost budgeting -Cost control

5. HR Applications. Improve Productivity W/ Automated Processes & Tools For HR Managers And Employees.

5.1. Communications Management

5.2. Risk Management

5.3. Project Procurment

6. Task Sequencing Approaches

7. PMBoK KA–HR Management

8. Projectitis

8.1. Happens when: -project manager spend more time on documenting project tasks -collecting performance measurements -recording project information -updating project completion

9. Project Management Tool: WBS

9.1. WBS stand for Work Breakdown Structure WBS is actually simple planning tool which is determine the attributes.

9.1.1. For example: 1. contact the field office and confirm the network 2. Purchase firewall hardware 3. configure the firewall

10. Includes: -Quality planning -Quality assurance -Quality control

11. INTRODUCTION

12. -Initiation -Scope Planning -Definition -Verification -Change Control

13. Application to Security

14. The Project Management Institute (PMI) Cert.

15. The Project Management Professional (PMP)

16. Certified Associate in Project Management (CAPM)

17. ○ PERT (which stands for program evaluation and review technique) chart is a flowchart or network diagram that displays project tasks in separate boxes. ○ Task dependencies are then connected with arrows between the boxes, allowing managers to create project milestones as well as identify any potential obstacles that the team may face ○ Have limited flexibility and not as useful for monitoring projects once underway

18. The application of knowledge, skills, tools, and techniques to project activities to meet project requirements

19. Example of a Project Management Team and Security.

19.1. – Champion – Team leader – Security policy developers – Risk assessment specialists – Security professionals – Systems administrators – End users

20. Information security is a process, not a project

21. However, each element of a security program can be managed as a project (managed processes)

22. Project plan development The process of integrating all of the project elements into a cohesive plan

22.1. Core components:

22.1.1. -Work time -Resources -Deliverables

23. Ensures that project plan includes only those activities necessary to complete it.

23.1. Major processes:

24. Ensures that project is finished by identified completion date while meeting objectives

24.1. Includes: -Activity definition -Activity sequencing -Activity duration estimating -Schedule development -Schedule control

25. Ensures project meets project specifications

26. Cost Management

27. Quality Management

28. Time Management

29. Scope Management

30. Project Integration

31. PROJECT MANAGEMENT

32. PMBoK KA