Learning Unit 10: Implementing Information Security

Description

Upon completion of this material you should be able to: Understand how the organization’s security blueprint becomes a project plan Identify the main components of a project using the work breakdown structure (WBS) method Grasp the significant role and importance of the project manager in the success of an information security project Understand the need for professional project management for complex projects
malzsoj@gmail.com
Flashcards by malzsoj@gmail.com, updated more than 1 year ago
malzsoj@gmail.com
Created by malzsoj@gmail.com about 9 years ago
43
0

Resource summary

Question Answer
how is SecSDLC implementation phase is accomplished ? through changing configuration and operation of organization’s information systems
name the 5 Implementation changes *Procedures (through policy) *People (through training) *Hardware (through firewalls) *Software (through encryption) *Data (through classification)
Name 3 Major steps in executing project plan ? *Planning the project *Supervising tasks and action steps *Wrapping up
Name 6 Major project tasks in WBS *Work to be accomplished *Assignees *Start and end dates *Amount of effort required *Estimated capital and noncapital expenses *Identification of dependencies between/among tasks
WBS Example
Name 3 Time impacts in the development of a project plan? *Time to order, receive, install, and configure security control *Time to train the users *Time to realize return on investment of control
Project scope: concerns boundaries of time and effort-hours needed to deliver planned features and quality level of project deliverables
what does Project management require? a unique set of skills and thorough understanding of a broad body of specialized knowledge
The Bull’s-Eye Model
2 Steps that can be taken to make organizations more amenable to change are *Reducing resistance to change from beginning of planning process *Develop culture that supports change
Tiered Risk Management Framework
Security Control Allocation
Accreditation: what authorizes an IT system to process, store, or transmit information.
Bull’s-eye method: requires that issues be addressed from the general to the specific, and that the focus be on systematic solutions instead of individual problems.
Certification: “the comprehensive evaluation of the technical and nontechnical security controls of an IT system to support the accreditation process that establishes the extent to which a particular design and implementation meets a set of specified security requirements.”
Change control: how medium- and large-sized organizations deal with the impact of technical change on the operation of the organization.
Cost benefit analysis (CBA): determines the impact that a specific technology or approach can have on the organization’s information assets and what it may cost.
Direct changeover: involves stopping the old method and beginning the new.
Joint application development: getting key representatives from user groups to serve as members of the SecSDLC development process.
Milestone: a specific point in the project plan when a task that has a noticeable impact on the progress of the project plan is complete.
Negative feedback loop (cybernetic loop): ensures that progress is measured periodically.
Parallel operations: involves running the new methods alongside the old methods.
Phased implementation: the most common conversion strategy and involves a measured rollout of the planned system, with a part of the whole being brought out and disseminated across an organization before the next piece is implemented.
Pilot implementation: the entire security system is put in place in a single office, department, or division, and issues that arise are dealt with before expanding to the rest of the organization.
Predecessors: tasks or action steps that come before the specific task at hand.
Project plan: instructs the individuals who are executing the implementation phase.
Project wrap-up: usually handled as a procedural task and assigned to a mid-level IT or information security manager.
Projectitis: when the project manager spends more time documenting project tasks, collecting performance measurements, recording project task information, and updating project completion forecasts than in accomplishing meaningful project work.
Request for proposal (RFP): a specification document suitable for distribution to vendors.
Successors: tasks or action steps that come after the task at hand.
Technology governance: a complex process that organizations use to manage the affects and costs of technology implementation, innovation, and obsolescence; guides how frequently technical systems are updated and how technical updates are approved and funded.
Work breakdown structure (WBS): simple planning tool.
Show full summary Hide full summary

Similar

Driver's Exam
darrinmagnus
Nuclear Physics: Quiz
alex.examtime9373
exchange midterm
maxwell3254
Rights and Responsibilities Flashcards - Edexcel GCSE Religious Studies Unit 8
nicolalennon12
GCSE Biology B2 (OCR)
Usman Rauf
The Great Gatsby - Aspects of Narrative
Sophie Beckingham
Black Civil Rights in the 1950s
c7jeremy
The Engineered World - Unit 1
Yachtmasterhammond
Finance- Break even
cesleviciutek
Romeo and Juliet notes
Faizaan Mohmed
Organic Nomenclature
Anna Wagner