Question: Module 9 (30 points) - Chapter 10 1. (Whitman & Mattord, 2016, p. 543) What is a project plan? Why is a security related project

Module 9 (30 points) - Chapter 10

1. (Whitman & Mattord, 2016, p. 543) What is a project plan? Why is a security related project plan often far more complicated than other plans?

2. (Whitman & Mattord, 2016, p. 543) What categories of constraints to project plan implementation are noted in the chapter? Give an example. Why does the scope of a security project need to be maintained?

3. (Whitman & Mattord, 2016, p. 543) List and describe the three major steps in executing the project plan. Name an organization that has helpful security project planning information.

4. (Whitman & Mattord, 2016, p. 543) Why is it a good practice to name specific individuals as resources early in the planning process? Why is it a good practice to assign start and end dates in the early stages of project planning?

6. (Whitman & Mattord, 2016, p. 543) List and describe the four basic conversion strategies (as described in the chapter) that are used when converting to a new system. Under which circumstances is each of these the best approach? What are possible failures during conversions?

Bibliography

Whitman, M. E., & Mattord, H. J. (2016). Principles of Information Security. Course Technology.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!