MANAGEMENT of INFORMATION SECURITY, Fifth Edition.

Slides:



Advertisements
Similar presentations
Project Management Concepts
Advertisements

Work Breakdown Structures
Chapter 3 Managing the Information Systems Project
© 2005 by Prentice Hall Chapter 3 Managing the Information Systems Project Modern Systems Analysis and Design Fourth Edition Jeffrey A. Hoffer Joey F.
© 2008 by Prentice Hall 3-1 ITCS311 Systems Analysis and Design Dr. Taher Homeed Feb 2010 Department of Computer Science College of IT University of Bahrain.
Systems Analysis and Design 9th Edition
Introduction to Project Management Chapter 6 Managing Project Scheduling Information Systems Project Management: A Process and Team Approach, 1e Fuller/Valacich/George.
1. Henry Laurence Gantt, A.B., M.E. ( November 1919) was a mechanical engineer and management consultant who is most famous for developing the.
Systems Analysis and Design 8th Edition
I find that the harder I work, the more luck I seem to have.
Modern Systems Analysis and Design Third Edition
Chapter 3 Managing the Information Systems Project
Project Plan The Development Plan The project plan is one of the first formal documents produced by the project team. It describes  How the project will.
TEL2813/IS2820 Security Management
Lean Six Sigma: Process Improvement Tools and Techniques Donna C. Summers © 2011 Pearson Higher Education, Upper Saddle River, NJ All Rights Reserved.
© 2006 ITT Educational Services Inc. System Analysis for Software Engineers: Unit 5 Slide 1 Chapter 3 Managing the Information Systems Project.
Chapter 3 : Managing the Information Systems Project.
© 2005 by Prentice Hall 3-1 Chapter 3 Managing the Information Systems Project Modern Systems Analysis and Design Fourth Edition.
Introduction to Management of Information Security
MANAGEMENT of INFORMATION SECURITY Second Edition.
Introduction- Project Management By Ctrl+C & Ctrl+V 1.
IT Project Management, Third Edition Chapter 6 1 Chapter 3: Project Time Management.
Lean Project Management
Basic of Project and Project Management Presentation.
BIS 360 – Lecture Two Ch. 3: Managing the IS Project.
Software Engineering Saeed Akhtar The University of Lahore Lecture 8 Originally shared for: mashhoood.webs.com.
CC3020N Fundamentals of Security Management CC3020N Fundamentals of Security Management Lecture 8 Information Security Implementation & Maintenance.
Copyright 2002 Prentice-Hall, Inc. Chapter 3 Managing the Information Systems Project 3.1 Modern Systems Analysis and Design.
Information Systems System Analysis 421 Chapter 3 Managing the Information Systems Project.
Chapter 3 Managing the Information Systems Project
(M) Chapter 12 MANGT 662 (A): Procurement, Logistics and Supply Chain Design Purchasing and Supply Chain Analysis (1/2)
Develop Schedule is the Process of analyzing activity sequences, durations, resource requirements, and schedule constraints to create the project schedule.
Prof. Shrikant M. Harle.  Scheduling is a process which tries to organize activities in logical sequence.  While it is not possible to know with certainty.
© 2008 Prentice Hall6-1 Introduction to Project Management Chapter 6 Managing Project Scheduling Information Systems Project Management: A Process and.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 5 Slide 1 Project management.
Project and Project Formulation and Management
Project Management and Management Tools
Chapter 11 Project Management.
Chapter 3 Managing the Information Systems Project
Project Management.
Project Management – PTM721S
PROJECT MANAGEMENT TOOLS AND TECHNIQUES
PROJECT MANAGEMENT.
Time Management.
Project Management MGT 30725
Project Management Systems
Managing the Information Systems Project
BUSINESS PLUG-IN B15 Project Management.
BUSINESS DRIVEN TECHNOLOGY
Business System Development
Project Management and Information Security
Introduction to Project Management
Project Management.
Activity Planning.
Chapter 6: Project Time Management
Chapter 6: Project Time Management
CHAPTER 6 PROJECT TIME MANAGEMENT
Project Time Management
Theory, Tools, and Obstacles
Introduction to Project Management Chapter 2 The Project Management Life Cycle Information Systems Project Management: A Process and Team Approach, 1e.
Project Management Process Groups
Project Management Chapter 11.
Modern Systems Analysis and Design Third Edition
Teaching slides Chapter 13
Importance of Project Schedules
CHAPTER 6 PROJECT TIME MANAGEMENT
Managing Project Work, Scope, Schedules, and Cost
Time Scheduling and Project management
Modern Systems Analysis and Design Third Edition
Presentation transcript:

MANAGEMENT of INFORMATION SECURITY, Fifth Edition

Project Management 2 Management of Information Security, 5th Edition © Cengage Learning

Project Management How can information security be both a process and a project? It is, in fact, a continuous series, or chain, of projects Some aspects of information security are not project based; rather, they are managed processes (operations) and are ongoing Projects are discrete sequences of activities with starting points and defined completion points A project is different from a process in that it is a temporary activity that is used to create a specific product, service, or end result 3 Management of Information Security, 5th Edition © Cengage Learning

The InfoSec Program Chain 4 Management of Information Security, 5th Edition © Cengage Learning

Project Management W.R. Duncan’s A Guide to the Project Management Body of Knowledge defines project management as: – the application of knowledge, skills, tools, and techniques to project activities to meet project requirements. Project management is accomplished through the use of processes such as: initiating, planning, executing, controlling, and closing Project management involves the temporary assemblage resources to complete a project Some projects are iterative, and occur regularly 5 Management of Information Security, 5th Edition © Cengage Learning

Project Management Organizations that make project management skills a priority benefit in the following ways: – Implementing a methodology ensures that no steps are missed – Creating a detailed blueprint of project activities provides a common reference tool and makes all project team members more productive by shortening the learning curve when getting projects underway – Identifying specific responsibilities for all the involved personnel reduces ambiguity and also reduces confusion – Clearly defining project constraints and minimum quality requirements increases the likelihood that the project will stay within them – Establishing performance measures and creating project milestones simplifies project monitoring – Identifying deviations in quality, time, or budget early on enables early correction of the problems 6 Management of Information Security, 5th Edition © Cengage Learning

Project Management Successful project management relies on careful and realistic project planning coupled with aggressive, proactive control Project success may be defined differently in each organization, but in general a project is deemed a success when: – It is completed on time or early – It is completed at or below its budgeted amount – It meets all specifications outlined in the approved project definition, and the deliverables are accepted by the end user and/or assigning entity Regardless of the approach, the goal is the same: to have all elements of the InfoSec program completed with quality deliverables, on a timely basis, and within budget 7 Management of Information Security, 5th Edition © Cengage Learning

PMBoK Knowledge Areas To apply project management to InfoSec, you must first identify an established project management methodology While other project management approaches exist, the PMBoK, promoted by the Project Management Institute (PMI) is considered the industry best practice 8 Management of Information Security, 5th Edition © Cengage Learning

PMBoK Knowledge Areas 9 Management of Information Security, 5th Edition © Cengage Learning

Project Management Tools There are many tools that support the management of the diverse resources in complex projects – Most project managers combine software tools that implement one or more of the dominant modeling approaches Projectitis occurs when the project manager spends more time documenting project tasks, collecting performance measurements, recording project task information, and updating project completion forecasts than accomplishing meaningful project work 10 Management of Information Security, 5th Edition © Cengage Learning

Work Breakdown Structure A project plan can be created using a very simple planning tool, such as the work breakdown structure (WBS) In the WBS approach, the project plan is first broken down into a few major tasks. Each of these major tasks is placed on the WBS task list 11 Management of Information Security, 5th Edition © Cengage Learning

Work Breakdown Structure (cont) The minimum attributes that should be determined for each task are: – The work to be accomplished (activities and deliverables) – Estimated amount of effort required for completion in hours or workdays – The common or specialty skills needed to perform the task – Task interdependencies 12 Management of Information Security, 5th Edition © Cengage Learning

Example Early Draft WBS 13 Management of Information Security, 5th Edition © Cengage Learning

Task-Sequencing Approaches Once a project reaches even a relatively modest size, say a few dozen tasks, there can be almost innumerable possibilities for task assignment and scheduling A number of approaches are available to assist the project manager in this sequencing effort 14 Management of Information Security, 5th Edition © Cengage Learning

Network Scheduling One method for sequencing tasks and subtasks in a project plan is known as network scheduling Network refers to the web of possible pathways to project completion from the beginning task to the ending task 15 Management of Information Security, 5th Edition © Cengage Learning

Simple Network Dependency 16 Management of Information Security, 5th Edition © Cengage Learning

Complex Network Dependency 17 Management of Information Security, 5th Edition © Cengage Learning

Program Evaluation and Review Technique (PERT) The most popular of networking dependency diagramming techniques, PERT was originally developed in the late 1950s to meet the needs of rapidly expanding government-driven engineering projects About the same time, a similar project, called the Critical Path Method, was being developed in industry It is possible to take a very complex operation and diagram it in PERT if you can answer three key questions about each activity: – How long will this activity take? – What activity occurs immediately before this activity can take place? – What activity occurs immediately after this activity? By identifying the path through the various activities, you can determine the critical path 18 Management of Information Security, 5th Edition © Cengage Learning

PERT (cont) As each possible path through the project is analyzed, the difference in time between the critical path and any other path - slack time - an indication of how much time is available for starting a noncritical task without delaying the project as a whole Should a delay be introduced, whether due to poor estimation of time, unexpected events, or the need to reassign resources to other paths such as the critical path, the tasks with slack time are the logical candidates for delay 19 Management of Information Security, 5th Edition © Cengage Learning

Program Evaluation and Review Technique 20 Management of Information Security, 5th Edition © Cengage Learning

PERT Advantages There are several advantages to the PERT method: – Makes planning large projects easier by facilitating the identification of pre- and post- activities – Allows planning to determine the probability of meeting requirements – Anticipates the impact of changes on the system – Presents information in a straightforward format that both technical and non-technical managers can understand and refer to in planning discussions – Requires no formal training 21 Management of Information Security, 5th Edition © Cengage Learning

PERT Disadvantages Disadvantages of the PERT method include: – Diagrams can become awkward and cumbersome, especially in very large projects – Diagrams can become expensive to develop and maintain, due to the complexities of some project development processes – Can be difficult to place an accurate “time to complete” on some tasks, especially in the initial construction of a project; inaccurate estimates invalidate any close critical path calculations 22 Management of Information Security, 5th Edition © Cengage Learning

Gantt Chart Another popular project management tools is the bar or Gantt chart, named for Henry Gantt, who developed this method in the early 1900s Like network diagrams, Gantt charts are easy to read and understand, and thus easy to present to management These simple bar charts are even easier to design and implement than the PERT diagrams, and yield much of the same information The Gantt chart lists activities on the vertical axis of a bar chart, and provides a simple time line on the horizontal axis 23 Management of Information Security, 5th Edition © Cengage Learning

Project Gantt Chart 24 Management of Information Security, 5th Edition © Cengage Learning

Automated Project Tools Microsoft Project is a widely used project management tool If you’re considering using an automated project management tool, keep the following in mind: – A software program cannot take the place of a skilled and experienced project manager who understands how to define tasks, allocate scarce resources, and manage the resources that are assigned – A software tool can get in the way of the work – Choose a tool that you can use effectively 25 Management of Information Security, 5th Edition © Cengage Learning