ICTD project management

in #project7 years ago

In principle-based ICTD project management, project is succeeded or failed by integrity in project conception, design, launch, acquisition, implementation and closure. It is indicated by the kind of questions raised during meetings and back channel
storytelling that tell about..

  1. Clarity,
  2. Coherence
  3. Consistency
  4. Capability
  5. Controlability
  6. Continuity
  7. Community

First three basic activities on securing information of the enterprise.

  1. Definition of Information Asset
  2. Assessment of Risks
  3. Identification of Control
  4. Implementation of Mitigation
    Acceptable standards on principle, process and content are necessary knowledge shared among people whose interest is protection, safety and privacy of enterprise information

Basic tools to communicate that a project is a GO....

  1. Project Readiness Assessment Matrix
  2. Project Roles Accountability, Responsibility, Expertize and Work Matrix
  3. Project Risks Valuation Matrix
  4. Project Requirement Traceability Worksheet
  5. Project Work, Budget and Procurement Plan
  6. Project Monitoring and Control Checkpoint
    If the tools are not made available and used, you will surely find project execution meeting loaded with questions of clarification and reaction.

First things first in information security management is called risk assessment.
Risk is threat to something important or critical to success being lost , comoromised or failed.
Assessment of risk pays attention on identification and analysis of threats being multiplied with vulnerabilities, and impact mitigation of making the bad condition lessened, prevented or changed..
The doing of the real thing in information security risk assessmet of the enterprise cover the following:

  1. Definition of Risks
    List of information assets to protect and the associated threats and vulnerability
  2. Analysis of Risks
    Rating and acceptance of consequent impact and the likelihood of incidents
  3. Identification of Risks Control
    List of treatments to prevent and resolve the risks
  4. Implementation of Risks Mitigation
    Action plan to execute risks control objectives.
    Effective doing of risk assessment begins with acceptable standards of knowledge on principle, process and content that are shared among people whose interest is protection, safety and privacy of enterprise information.
    The simple and communicable matrix of information security assesment contains:
  5. List of enterprise information assets that have influenced on security
  6. Associated risks owners and asset stakeholders
  7. Threats and vulnerability linked to assets
  8. Accepted impact and Likelihood of both threat and vulnerability.
  9. Control objectives and action to plan

Sort:  

Congratulations @awesomewanderer! You have completed some achievement on Steemit and have been rewarded with new badge(s) :

Award for the number of posts published

Click on any badge to view your own Board of Honor on SteemitBoard.
For more information about SteemitBoard, click here

If you no longer want to receive notifications, reply to this comment with the word STOP

By upvoting this notification, you can help all Steemit users. Learn how here!

Hello,

As a follower of @flamingbot this post has been randomly selected for resteem for free! Enjoy your resteem activities! Have a great day!

To use our service: simply upvote this comment & follow us and send your post link as a transaction of 0.001 to @flamingbot. Your post is resteemed in 5hours. Good luck!

Coin Marketplace

STEEM 0.17
TRX 0.16
JST 0.028
BTC 76556.14
ETH 2925.60
USDT 1.00
SBD 2.61