Syngress IT Security Project Management Handbook -  Susan Snedaker

Syngress IT Security Project Management Handbook (eBook)

eBook Download: PDF
2006 | 1. Auflage
608 Seiten
Elsevier Science (Verlag)
978-0-08-048977-3 (ISBN)
Systemvoraussetzungen
51,17 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems.

The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success.

* The first book devoted exclusively to managing IT security projects

* Expert authors combine superb project management skills with in-depth coverage of highly complex security projects

* By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success.* The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects* By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments

Cover 1
Contents 13
Foreword 27
Acknowledgments 28
Chapter 1: IT Security Project Management Building Blocks 29
Introduction 30
Corporate Security Project Plan Components 31
The True Cost of Security 32
Project Success Factors 43
Project Constraints 49
Corporate Strategy and IT Security 51
How Corporate Culture and Policies Impact IT Security 52
Chapter 2: Defining the Security Project 59
Introduction 60
Defining the Security Problem 60
Defining the Outcome 65
Defining Potential Security Project Solutions 66
Defining the Optimal Security Project Solution 67
Applying Security Project Constraints 68
Developing the Security Project Proposal 72
Identifying the Security Project Sponsor 73
Chapter 3: Organizing the IT Security Project 79
Introduction 80
Identifying the IT Security Project Team 80
Identifying IT Security Project Stakeholders 81
Defining IT Security Project Requirements 83
Defining IT Security Project Objectives 87
Defining IT Security Project Processes 89
Chapter 4: Building Quality Into IT Security Projects 103
Introduction 104
Planning IT Security Project Quality 104
Monitoring IT Security Project Quality 113
Testing IT Security Project Quality 116
Chapter 5: Forming the IT Security Project Team 123
Introduction 124
Identifying IT Security Project Team Requirements 124
Identifying Staffing Requirements and Constraints 133
Acquiring the Needed Staff 135
Forming the IT Security Project Team 136
Chapter 6: Planning The IT Security Project 145
Introduction 146
Creating the IT Security Project Work Breakdown Structure 146
Defining Project Tasks and Sub-tasks 149
Checking Project Scope 151
Developing Task Details 153
Identifying and Working With the Critical Path 163
Testing IT Security Project Results 164
Budget, Schedule, Risks, and Communications 166
Chapter 7: Managing the IT Security Project 175
Introduction 176
Initiating the IT Security Project 176
Monitoring and Managing IT Security Project Progress 177
Monitoring IT Security Project Risk 185
Managing IT Security Project Change 186
Testing IT Security Project Results 189
Chapter 8: Closing Out the IT Security Project 197
Introduction 198
Evaluating Project Completion 198
Closing Issues Log, Change Requests, and Error Reports 200
Preparing for Implementation, Deployment, and Operational Transfer 201
Reviewing Lessons Learned 206
Documentation and Compliance Reports 209
Chapter 9: Corporate IT Security Project Plan 217
Introduction 218
Defining Your Security Strategy 218
Legal Standards Relevant to Corporate IT Security 220
Corporate IT Security Project Plan Overview 240
Corporate Security Auditing 243
Corporate IT Security Project Parameters 252
Project Work Breakdown Structure 267
Project Risks 273
Project Constraints 275
Project Assumptions 276
Project Schedule and Budget 276
Chapter 10: General IT Security Plan 289
Introduction 290
IT Security Assessment and Auditing 290
Authentication 326
Access Control 330
Auditing 332
Attacks 338
Assessment and Audit Report 343
Project Plan 348
General IT Security Project Parameters 353
General IT Security Project Plan 362
Chapter 11: IT Infrastructure Security Plan 373
Introduction 374
Infrastructure Security Assessment 374
Project Parameters 436
Project Team 447
Project Organization 448
Project Work Breakdown Structure 448
Project Risks and Mitigation Strategies 455
Project Constraints and Assumptions 457
Project Schedule and Budget 459
IT Infrastructure Security Project Outline 460
Chapter 12: Wireless Security Project Plan 469
Introduction 470
Wireless Security Auditing 471
Wireless Security Project Parameters 513
Project Team 528
Project Organization 529
Project Work Breakdown Structure 530
Project Risks 534
Project Constraints and Assumptions 535
Project Schedule and Budget 536
Wireless Security Project Outline 537
Chapter 13: IT Operational Security Plan 545
Introduction 546
Operational Security Assessment 547
Project Parameters 593
Project Team 605
Project Organization 606
Project Work Breakdown Structure 607
Project Risks and Mitigation Strategies 612
Project Constraints and Assumptions 614
Project Schedule and Budget 614
IT Operational Security Project Outline 615
Index 625

Erscheint lt. Verlag 4.7.2006
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Mathematik / Informatik Informatik Grafik / Design
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Wirtschaft Betriebswirtschaft / Management
ISBN-10 0-08-048977-X / 008048977X
ISBN-13 978-0-08-048977-3 / 9780080489773
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90