SlideShare a Scribd company logo
Information security project
management
Introduction:
• SecSDLC implementation phase is accomplished
through changing configuration and operation of
organization’s information systems
• Implementation includes changes to procedures,
people, hardware, software, and data
• Organization translates blueprint for information
security into a concrete project plan
Overview:
• The Trustworthy Computing Security
Development Lifecycle provides an example of
a pragmatic way to incorporate security into
development.
• The objective of the SDL is not to overhaul an
existing process totally but to add well-
defined security checkpoints and security
deliverables.
Objectives:
• Understand the definition of information security
•
• Comprehend the history of computer security and how it
evolved into information security
•
• Understand the key terms and concepts of information
security
•
• Outline the phases of the security systems development life
cycle
•
• Understand the roles of professionals involved in information
security within an organization
•
Information Security Project
Management
• Once organization’s vision and objectives are
understood, process for creating project plan can be
defined
• Major steps in executing project plan are:
Planning the project
Supervising tasks and action steps
Wrapping up
• Each organization must determine its own project
management methodology for IT and information
security projects
What is Security:
• The quality or state of being secure--to be free from
danger”
• To be protected from adversaries
• A successful organization should have multiple
layers of security in place:
Physical security
Personal security
Operations security
Project managers need:
• requirements and scope
• the technical plan
• resources
• estimates
• project and product risks
What is Information Security:
• Information security is designed to protect the
confidentially, integrity, availability of malicious
intentions.
• Information security in today’s enterprise is a “well-
informed sense of assurance that the information risks
and controls are in balance
• The protection of information and its critical elements,
including systems and hardware that use, store, and
transmit that information
•
• Necessary tools: policy, awareness, training, education,
technology
•
Components of an Information
System:
• To fully understand the importance of information
security, you need to know the elements of an
information system
• An Information System (IS) is much more than
computer hardware; it is the entire set of software,
hardware, data, people, and procedures necessary
to use information as a resource in the organization
Balancing Security and Access:
• It is impossible to obtain perfect security - it is not
an absolute; it is a process
• Security should be considered a balance between
protection and availability
• To achieve balance, the level of security must allow
reasonable access, yet protect against threats
Bottom Up Approach
• Security from a grass-roots effort - systems
administrators attempt to improve the security of
their systems
• Key advantage - technical expertise of the individual
administrators
• Seldom works, as it lacks a number of critical
features:
• participant support
• organizational staying power
Top-down Approach:
• Initiated by upper management:
• issue policy, procedures, and processes
• determine who is accountable for each of the
required actions
• This approach has strong upper management
support, a dedicated champion, dedicated funding,
clear planning, and the chance to influence
organizational culture
• May also involve a formal development strategy
• referred to as a systems development life cycle
Most successful top-down approach
Project management
• Application of knowledge, skills, tools, and
techniques to project activities to meet project
requirements
• Project management is accomplished through use
of processes such as: initiating, planning, executing,
controlling, and closing
• Benefits for project management:
– Implementation of a methodology
– Improved planning
– Less ambiguity about roles
– Simplify project monitoring
– Early identification of deviations in quality, time,budget
The Need for Project Management
• Project management requires a unique set of skills
and thorough understanding of a broad body of
specialized knowledge
•
• Most information security projects require a trained
project manager (a CISO) or skilled IT manager
versed in project management techniques
Developing the Project Plan
• Creation of project plan can be done using work
breakdown structure (WBS)
• Major project tasks in WBS are work to be
accomplished; individuals assigned; start and end
dates; amount of effort required; estimated capital
and noncapital expenses; and identification of
dependencies between/among tasks
• Process of integrating all project elements into
cohesive plan with goal of completing project
within allotted work time using no more than
allotted project resources
Project planning steps
• Project Planning Considerations
• Financial Considerations
• Priority Considerations
• Time and Scheduling Considerations
• Staffing Considerations
• Procurement Considerations
• Organizational Feasibility Considerations
• Training and Indoctrination Considerations
• Scope Considerations

More Related Content

What's hot

CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
Sam Bowne
 
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life CycleCNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life Cycle
Sam Bowne
 
RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016Ronald (RON) Ray Harris
 
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)
Sam Bowne
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
sivadnolram
 
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life CycleCNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life Cycle
Sam Bowne
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
Kabul Education University
 
Lesson 1
Lesson 1Lesson 1
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)
Sam Bowne
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
SLVA Information Security
 
CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016
Hafiz Sheikh Adnan Ahmed
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilience
Rishi Kant
 
Lesson 2
Lesson 2Lesson 2
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
Karthikeyan Dhayalan
 
Lesson 1- Information Policy
Lesson 1- Information PolicyLesson 1- Information Policy
Lesson 1- Information Policy
MLG College of Learning, Inc
 
CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016
Hafiz Sheikh Adnan Ahmed
 
CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)
Sam Bowne
 
Chapter 1 Personal security
Chapter 1  Personal securityChapter 1  Personal security
Chapter 1 Personal security
Karthikeyan Dhayalan
 
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
Sam Bowne
 
ROLE OF CIO
ROLE OF CIOROLE OF CIO
ROLE OF CIO
ashok kumar
 

What's hot (20)

CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
 
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life CycleCNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life Cycle
 
RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016
 
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life CycleCNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life Cycle
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilience
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
Lesson 1- Information Policy
Lesson 1- Information PolicyLesson 1- Information Policy
Lesson 1- Information Policy
 
CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016
 
CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)
 
Chapter 1 Personal security
Chapter 1  Personal securityChapter 1  Personal security
Chapter 1 Personal security
 
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
 
ROLE OF CIO
ROLE OF CIOROLE OF CIO
ROLE OF CIO
 

Viewers also liked

Redes de computadora julieta casanova
Redes de computadora   julieta casanovaRedes de computadora   julieta casanova
Redes de computadora julieta casanova
julieta casanova
 
XRF Analysis of Soil Samples from How Caverns
XRF Analysis of Soil Samples from How CavernsXRF Analysis of Soil Samples from How Caverns
XRF Analysis of Soil Samples from How Caverns
Joseph Stabb, ABD
 
Proyek vektor faperika universitas riau 2015 syafrijal
Proyek vektor faperika universitas riau 2015 syafrijalProyek vektor faperika universitas riau 2015 syafrijal
Proyek vektor faperika universitas riau 2015 syafrijal
Muhammad Ridwan
 
求主賞賜靈氣
求主賞賜靈氣求主賞賜靈氣
求主賞賜靈氣
gaanchurch
 
라이브북 ''SX797.COM'' 빙고방법
라이브북 ''SX797.COM'' 빙고방법라이브북 ''SX797.COM'' 빙고방법
라이브북 ''SX797.COM'' 빙고방법
jertgerh
 
ANALISIS DEL PROTOCOLO DE INVESTIGACIÓN
ANALISIS DEL PROTOCOLO DE INVESTIGACIÓN ANALISIS DEL PROTOCOLO DE INVESTIGACIÓN
ANALISIS DEL PROTOCOLO DE INVESTIGACIÓN
Emma Alfaro Zenteno
 
생중계스포츠북 ''SX797.COM'' 카지노승률
생중계스포츠북 ''SX797.COM'' 카지노승률생중계스포츠북 ''SX797.COM'' 카지노승률
생중계스포츠북 ''SX797.COM'' 카지노승률
jertgerh
 
[WEBINARIO] "Consejos para mejorar tu delivery en Hotmail"
[WEBINARIO] "Consejos para mejorar tu delivery en Hotmail"[WEBINARIO] "Consejos para mejorar tu delivery en Hotmail"
[WEBINARIO] "Consejos para mejorar tu delivery en Hotmail"
OM Latam
 
[Webinario amdia OM Latam] ¿Estas aprovechando al máximo tu base de datos?
[Webinario amdia OM Latam] ¿Estas aprovechando al máximo tu base de datos?[Webinario amdia OM Latam] ¿Estas aprovechando al máximo tu base de datos?
[Webinario amdia OM Latam] ¿Estas aprovechando al máximo tu base de datos?
OM Latam
 
ENRUTAMIENTO Y ACCESO REMOTO CON SERVER 2012 R2
ENRUTAMIENTO Y ACCESO REMOTO CON SERVER 2012 R2ENRUTAMIENTO Y ACCESO REMOTO CON SERVER 2012 R2
ENRUTAMIENTO Y ACCESO REMOTO CON SERVER 2012 R2
nelson rodriguez huallpa
 
Awareness is Power - If You Can Count to Four
Awareness is Power - If You Can Count to FourAwareness is Power - If You Can Count to Four
Awareness is Power - If You Can Count to Four
Robert C. Worstell
 
Exposició ramón llull
Exposició ramón llullExposició ramón llull
Exposició ramón llull
juana montero gomez
 
Mossack 17.6
Mossack 17.6Mossack 17.6
Mossack 17.6
Luiz Carlos Azenha
 
Desarrollo de Proyecto Audiovisual - Resumen textos Pablo Del Teso
Desarrollo de Proyecto Audiovisual - Resumen textos Pablo Del TesoDesarrollo de Proyecto Audiovisual - Resumen textos Pablo Del Teso
Desarrollo de Proyecto Audiovisual - Resumen textos Pablo Del Teso
Carolina Medina
 

Viewers also liked (15)

Redes de computadora julieta casanova
Redes de computadora   julieta casanovaRedes de computadora   julieta casanova
Redes de computadora julieta casanova
 
XRF Analysis of Soil Samples from How Caverns
XRF Analysis of Soil Samples from How CavernsXRF Analysis of Soil Samples from How Caverns
XRF Analysis of Soil Samples from How Caverns
 
LoboHR - presentation
LoboHR - presentationLoboHR - presentation
LoboHR - presentation
 
Proyek vektor faperika universitas riau 2015 syafrijal
Proyek vektor faperika universitas riau 2015 syafrijalProyek vektor faperika universitas riau 2015 syafrijal
Proyek vektor faperika universitas riau 2015 syafrijal
 
求主賞賜靈氣
求主賞賜靈氣求主賞賜靈氣
求主賞賜靈氣
 
라이브북 ''SX797.COM'' 빙고방법
라이브북 ''SX797.COM'' 빙고방법라이브북 ''SX797.COM'' 빙고방법
라이브북 ''SX797.COM'' 빙고방법
 
ANALISIS DEL PROTOCOLO DE INVESTIGACIÓN
ANALISIS DEL PROTOCOLO DE INVESTIGACIÓN ANALISIS DEL PROTOCOLO DE INVESTIGACIÓN
ANALISIS DEL PROTOCOLO DE INVESTIGACIÓN
 
생중계스포츠북 ''SX797.COM'' 카지노승률
생중계스포츠북 ''SX797.COM'' 카지노승률생중계스포츠북 ''SX797.COM'' 카지노승률
생중계스포츠북 ''SX797.COM'' 카지노승률
 
[WEBINARIO] "Consejos para mejorar tu delivery en Hotmail"
[WEBINARIO] "Consejos para mejorar tu delivery en Hotmail"[WEBINARIO] "Consejos para mejorar tu delivery en Hotmail"
[WEBINARIO] "Consejos para mejorar tu delivery en Hotmail"
 
[Webinario amdia OM Latam] ¿Estas aprovechando al máximo tu base de datos?
[Webinario amdia OM Latam] ¿Estas aprovechando al máximo tu base de datos?[Webinario amdia OM Latam] ¿Estas aprovechando al máximo tu base de datos?
[Webinario amdia OM Latam] ¿Estas aprovechando al máximo tu base de datos?
 
ENRUTAMIENTO Y ACCESO REMOTO CON SERVER 2012 R2
ENRUTAMIENTO Y ACCESO REMOTO CON SERVER 2012 R2ENRUTAMIENTO Y ACCESO REMOTO CON SERVER 2012 R2
ENRUTAMIENTO Y ACCESO REMOTO CON SERVER 2012 R2
 
Awareness is Power - If You Can Count to Four
Awareness is Power - If You Can Count to FourAwareness is Power - If You Can Count to Four
Awareness is Power - If You Can Count to Four
 
Exposició ramón llull
Exposició ramón llullExposició ramón llull
Exposició ramón llull
 
Mossack 17.6
Mossack 17.6Mossack 17.6
Mossack 17.6
 
Desarrollo de Proyecto Audiovisual - Resumen textos Pablo Del Teso
Desarrollo de Proyecto Audiovisual - Resumen textos Pablo Del TesoDesarrollo de Proyecto Audiovisual - Resumen textos Pablo Del Teso
Desarrollo de Proyecto Audiovisual - Resumen textos Pablo Del Teso
 

Similar to project managmnet

chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
elmuhammadmuhammad
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
it160320737038
 
Human Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxHuman Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptx
Shreeveni
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
Divya Tiwari
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Shruti ppt
Shruti pptShruti ppt
Shruti ppt
SHRUTI SAGAR
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
Zefren Edior
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
KATHEESKUMAR S
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
FirstMutualHoldings
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
dotco
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
MichaelSadeghiPhDABD
 
The Project Management and Information Technology Context(1).pptx
The Project Management and Information Technology Context(1).pptxThe Project Management and Information Technology Context(1).pptx
The Project Management and Information Technology Context(1).pptx
jayakodyjayakody
 
Unit-1 part 2.pptx
Unit-1 part 2.pptxUnit-1 part 2.pptx
Unit-1 part 2.pptx
HKShab
 
CISM_WK_1.pptx
CISM_WK_1.pptxCISM_WK_1.pptx
CISM_WK_1.pptx
dotco
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan Nganda
See You Rise Holdings
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
shinydey
 
CYBER SECURITY.pdf
CYBER SECURITY.pdfCYBER SECURITY.pdf
CYBER SECURITY.pdf
Nidhi Rastogi
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
Hafiz Sheikh Adnan Ahmed
 

Similar to project managmnet (20)

chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Human Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxHuman Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptx
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Shruti ppt
Shruti pptShruti ppt
Shruti ppt
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
The Project Management and Information Technology Context(1).pptx
The Project Management and Information Technology Context(1).pptxThe Project Management and Information Technology Context(1).pptx
The Project Management and Information Technology Context(1).pptx
 
Unit-1 part 2.pptx
Unit-1 part 2.pptxUnit-1 part 2.pptx
Unit-1 part 2.pptx
 
CISM_WK_1.pptx
CISM_WK_1.pptxCISM_WK_1.pptx
CISM_WK_1.pptx
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan Nganda
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
CYBER SECURITY.pdf
CYBER SECURITY.pdfCYBER SECURITY.pdf
CYBER SECURITY.pdf
 
Mandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINALMandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINAL
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

project managmnet

  • 2. Introduction: • SecSDLC implementation phase is accomplished through changing configuration and operation of organization’s information systems • Implementation includes changes to procedures, people, hardware, software, and data • Organization translates blueprint for information security into a concrete project plan
  • 3. Overview: • The Trustworthy Computing Security Development Lifecycle provides an example of a pragmatic way to incorporate security into development. • The objective of the SDL is not to overhaul an existing process totally but to add well- defined security checkpoints and security deliverables.
  • 4. Objectives: • Understand the definition of information security • • Comprehend the history of computer security and how it evolved into information security • • Understand the key terms and concepts of information security • • Outline the phases of the security systems development life cycle • • Understand the roles of professionals involved in information security within an organization •
  • 5. Information Security Project Management • Once organization’s vision and objectives are understood, process for creating project plan can be defined • Major steps in executing project plan are: Planning the project Supervising tasks and action steps Wrapping up • Each organization must determine its own project management methodology for IT and information security projects
  • 6. What is Security: • The quality or state of being secure--to be free from danger” • To be protected from adversaries • A successful organization should have multiple layers of security in place: Physical security Personal security Operations security
  • 7. Project managers need: • requirements and scope • the technical plan • resources • estimates • project and product risks
  • 8. What is Information Security: • Information security is designed to protect the confidentially, integrity, availability of malicious intentions. • Information security in today’s enterprise is a “well- informed sense of assurance that the information risks and controls are in balance • The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information • • Necessary tools: policy, awareness, training, education, technology •
  • 9. Components of an Information System: • To fully understand the importance of information security, you need to know the elements of an information system • An Information System (IS) is much more than computer hardware; it is the entire set of software, hardware, data, people, and procedures necessary to use information as a resource in the organization
  • 10. Balancing Security and Access: • It is impossible to obtain perfect security - it is not an absolute; it is a process • Security should be considered a balance between protection and availability • To achieve balance, the level of security must allow reasonable access, yet protect against threats
  • 11. Bottom Up Approach • Security from a grass-roots effort - systems administrators attempt to improve the security of their systems • Key advantage - technical expertise of the individual administrators • Seldom works, as it lacks a number of critical features: • participant support • organizational staying power
  • 12. Top-down Approach: • Initiated by upper management: • issue policy, procedures, and processes • determine who is accountable for each of the required actions • This approach has strong upper management support, a dedicated champion, dedicated funding, clear planning, and the chance to influence organizational culture • May also involve a formal development strategy • referred to as a systems development life cycle Most successful top-down approach
  • 13. Project management • Application of knowledge, skills, tools, and techniques to project activities to meet project requirements • Project management is accomplished through use of processes such as: initiating, planning, executing, controlling, and closing • Benefits for project management: – Implementation of a methodology – Improved planning – Less ambiguity about roles – Simplify project monitoring – Early identification of deviations in quality, time,budget
  • 14. The Need for Project Management • Project management requires a unique set of skills and thorough understanding of a broad body of specialized knowledge • • Most information security projects require a trained project manager (a CISO) or skilled IT manager versed in project management techniques
  • 15. Developing the Project Plan • Creation of project plan can be done using work breakdown structure (WBS) • Major project tasks in WBS are work to be accomplished; individuals assigned; start and end dates; amount of effort required; estimated capital and noncapital expenses; and identification of dependencies between/among tasks • Process of integrating all project elements into cohesive plan with goal of completing project within allotted work time using no more than allotted project resources
  • 16. Project planning steps • Project Planning Considerations • Financial Considerations • Priority Considerations • Time and Scheduling Considerations • Staffing Considerations • Procurement Considerations • Organizational Feasibility Considerations • Training and Indoctrination Considerations • Scope Considerations