Created by malzsoj@gmail.com
over 9 years ago
|
||
Question | Answer |
how is SecSDLC implementation phase is accomplished ? | through changing configuration and operation of organization’s information systems |
name the 5 Implementation changes | *Procedures (through policy) *People (through training) *Hardware (through firewalls) *Software (through encryption) *Data (through classification) |
Name 3 Major steps in executing project plan ? | *Planning the project *Supervising tasks and action steps *Wrapping up |
Name 6 Major project tasks in WBS | *Work to be accomplished *Assignees *Start and end dates *Amount of effort required *Estimated capital and noncapital expenses *Identification of dependencies between/among tasks |
WBS Example | |
Name 3 Time impacts in the development of a project plan? | *Time to order, receive, install, and configure security control *Time to train the users *Time to realize return on investment of control |
Project scope: | concerns boundaries of time and effort-hours needed to deliver planned features and quality level of project deliverables |
what does Project management require? | a unique set of skills and thorough understanding of a broad body of specialized knowledge |
The Bull’s-Eye Model | |
2 Steps that can be taken to make organizations more amenable to change are | *Reducing resistance to change from beginning of planning process *Develop culture that supports change |
Tiered Risk Management Framework | |
Security Control Allocation | |
Accreditation: | what authorizes an IT system to process, store, or transmit information. |
Bull’s-eye method: | requires that issues be addressed from the general to the specific, and that the focus be on systematic solutions instead of individual problems. |
Certification: | “the comprehensive evaluation of the technical and nontechnical security controls of an IT system to support the accreditation process that establishes the extent to which a particular design and implementation meets a set of specified security requirements.” |
Change control: | how medium- and large-sized organizations deal with the impact of technical change on the operation of the organization. |
Cost benefit analysis (CBA): | determines the impact that a specific technology or approach can have on the organization’s information assets and what it may cost. |
Direct changeover: | involves stopping the old method and beginning the new. |
Joint application development: | getting key representatives from user groups to serve as members of the SecSDLC development process. |
Milestone: | a specific point in the project plan when a task that has a noticeable impact on the progress of the project plan is complete. |
Negative feedback loop (cybernetic loop): | ensures that progress is measured periodically. |
Parallel operations: | involves running the new methods alongside the old methods. |
Phased implementation: | the most common conversion strategy and involves a measured rollout of the planned system, with a part of the whole being brought out and disseminated across an organization before the next piece is implemented. |
Pilot implementation: | the entire security system is put in place in a single office, department, or division, and issues that arise are dealt with before expanding to the rest of the organization. |
Predecessors: | tasks or action steps that come before the specific task at hand. |
Project plan: | instructs the individuals who are executing the implementation phase. |
Project wrap-up: | usually handled as a procedural task and assigned to a mid-level IT or information security manager. |
Projectitis: | when the project manager spends more time documenting project tasks, collecting performance measurements, recording project task information, and updating project completion forecasts than in accomplishing meaningful project work. |
Request for proposal (RFP): | a specification document suitable for distribution to vendors. |
Successors: | tasks or action steps that come after the task at hand. |
Technology governance: | a complex process that organizations use to manage the affects and costs of technology implementation, innovation, and obsolescence; guides how frequently technical systems are updated and how technical updates are approved and funded. |
Work breakdown structure (WBS): | simple planning tool. |
Want to create your own Flashcards for free with GoConqr? Learn more.