Скачать книгу

you have responded to all the appropriate statements in each section, compute your average score for that section, using the formula provided, and round to the nearest tenth. Then transfer to the corresponding spoke in the Information Technology Security Risk Assessment Scorecard on the second next page of the Self-Assessment.

      Your completed Information Technology Security Risk Assessment Scorecard will give you a clear presentation of which Information Technology Security Risk Assessment areas need attention.

      Information Technology Security Risk Assessment

      Scorecard Example

      Example of how the finalized Scorecard can look like:

      Information Technology Security Risk Assessment

      Scorecard

      Your Scores:

      BEGINNING OF THE

      SELF-ASSESSMENT:

      Table of Contents

      About The Art of Service8

      Included Resources - how to access8

      Purpose of this Self-Assessment10

      How to use the Self-Assessment11

      Information Technology Security Risk Assessment

      Scorecard Example13

      Information Technology Security Risk Assessment

      Scorecard14

      BEGINNING OF THE

      SELF-ASSESSMENT:15

      CRITERION #1: RECOGNIZE16

      CRITERION #2: DEFINE:29

      CRITERION #3: MEASURE:45

      CRITERION #4: ANALYZE:60

      CRITERION #5: IMPROVE:77

      CRITERION #6: CONTROL:94

      CRITERION #7: SUSTAIN:107

      Information Technology Security Risk Assessment and Managing Projects, Criteria for Project Managers:133

      1.0 Initiating Process Group: Information Technology Security Risk Assessment134

      1.1 Project Charter: Information Technology Security Risk Assessment136

      1.2 Stakeholder Register: Information Technology Security Risk Assessment138

      1.3 Stakeholder Analysis Matrix: Information Technology Security Risk Assessment139

      2.0 Planning Process Group: Information Technology Security Risk Assessment141

      2.1 Project Management Plan: Information Technology Security Risk Assessment144

      2.2 Scope Management Plan: Information Technology Security Risk Assessment146

      2.3 Requirements Management Plan: Information Technology Security Risk Assessment148

      2.4 Requirements Documentation: Information Technology Security Risk Assessment150

      2.5 Requirements Traceability Matrix: Information Technology Security Risk Assessment152

      2.6 Project Scope Statement: Information Technology Security Risk Assessment154

      2.7 Assumption and Constraint Log: Information Technology Security Risk Assessment156

      2.8 Work Breakdown Structure: Information Technology Security Risk Assessment159

      2.9 WBS Dictionary: Information Technology Security Risk Assessment161

      2.10 Schedule Management Plan: Information Technology Security Risk Assessment163

      2.11 Activity List: Information Technology Security Risk Assessment165

      2.12 Activity Attributes: Information Technology Security Risk Assessment167

      2.13 Milestone List: Information Technology Security Risk Assessment169

      2.14 Network Diagram: Information Technology Security Risk Assessment171

      2.15 Activity Resource Requirements: Information Technology Security Risk Assessment173

      2.16 Resource Breakdown Structure: Information Technology Security Risk Assessment175

      2.17 Activity Duration Estimates: Information Technology Security Risk Assessment177

      2.18 Duration Estimating Worksheet: Information Technology Security Risk Assessment180

      2.19 Project Schedule: Information Technology Security Risk Assessment182

      2.20 Cost Management Plan: Information Technology Security Risk Assessment184

      2.21 Activity Cost Estimates: Information Technology Security Risk Assessment186

      2.22 Cost Estimating Worksheet: Information Technology Security Risk Assessment188

      2.23 Cost Baseline: Information Technology Security Risk Assessment190

      2.24 Quality Management Plan: Information Technology Security Risk Assessment192

      2.25 Quality Metrics: Information Technology Security Risk Assessment194

      2.26 Process Improvement Plan: Information Technology Security Risk Assessment196

      2.27 Responsibility Assignment Matrix: Information Technology Security Risk Assessment198

      2.28 Roles and Responsibilities: Information Technology Security Risk Assessment200

      2.29 Human Resource Management Plan: Information Technology Security Risk Assessment202

      2.30 Communications Management Plan: Information Technology Security Risk Assessment204

      2.31 Risk Management Plan: Information Technology Security Risk Assessment206

      2.32 Risk Register: Information Technology Security Risk Assessment208

      2.33 Probability and Impact Assessment: Information Technology Security Risk Assessment210

      2.34 Probability and Impact Matrix: Information Technology Security Risk Assessment212

      2.35 Risk Data Sheet: Information Technology Security Risk Assessment214

      2.36 Procurement Management Plan: Information Technology Security Risk Assessment216

      2.37 Source Selection Criteria: Information Technology Security Risk Assessment218

      2.38 Stakeholder Management Plan: Information Technology Security Risk Assessment220

      2.39 Change Management Plan: Information Technology Security Risk Assessment222

      3.0 Executing Process Group: Information Technology Security Risk Assessment224

      3.1 Team Member Status Report: Information Technology Security Risk Assessment226

      3.2 Change Request: Information Technology Security Risk Assessment228

      3.3 Change Log: Information Technology Security Risk Assessment230

      3.4 Decision Log: Information Technology Security Risk Assessment232

      3.5 Quality Audit: Information Technology Security Risk Assessment234

      3.6 Team Directory: Information Technology Security Risk Assessment237

      3.7 Team Operating Agreement: Information Technology Security Risk Assessment239

      3.8 Team Performance Assessment: Information Technology Security Risk Assessment241

      3.9 Team Member Performance Assessment: Information Technology Security Risk Assessment244

      3.10 Issue Log: Information Technology Security Risk Assessment246

      4.0 Monitoring and Controlling

Скачать книгу