Probability and influence matrix.
management plan preparation: methodology. Roles and responsibilities. Budget. Set a timetable. Risk category. Definition of risk probability and influence
25
views
Probability and influence matrix.
of risk management plan preparation: methodology. Roles and responsibilities. Budget. Set a timetable. Risk category. Definition of risk probability and influence
25
views
The project team holds a planning meeting
Participants in these meetings can include project manager, project team leader, any person in the organization who is responsible for managing the risk plan preparation and implementation activities, key project stakeholders, and any other person according to actual needs. The output of risk management plan preparation: methodology. Roles and responsibilities. Budget. Set a timetable. Risk category. Definition of risk probability and influence
26
views
Automatic replacement of certificates and key pairs
Cross authentication, separation of encryption key and signature key; Support non repudiation of digital signature; Key history management and other functions. Using digital signature can confirm two points: first, the information is sent by the signer; Second, the information has not been modified since it was issued until it was received. A perfect signature mechanism should reflect the sending party's signature and the receiving party's signature and return receipt.
25
views
1) Encryption mechanism: data encryption is to
And form ciphertext that is difficult to understand. According to the similarities and differences between the encryption key and the decryption key, there are two kinds of symmetric cryptosystems (encryption and decryption use the same key) and asymmetric cryptosystems. 2) PKI and digital signature PKI is the foundation of Ca security certification system, which can realize the management of Ca and certificate: key backup and recovery
11.7K
views
Standard is the first formal standard for comput
It divides the security of the computer system into 4 levels and 7 levels: low high class D security level, class C security level, class B security level, class a security level d1c1c2b1b2b3a152 data security and confidentiality the cryptosystem today is based on three basic hypotheses, namely, randomness hypothesis, Computational Hypothesis and physical hypothesis.
11.7K
views
ï¼›Application system must fundamentally change s2-mis
(supersecurity management information system) is characterized by dedicated hardware and system software; PKI / Ca security system must have password; The application system must be fundamentally changed; Main hardware and system software require PKI / CA certification 4) trusted computer system TCSEC (trusted computer system evaluation criteria)
25
views
3) Information security assurance system
MIS + s (Management Information System + security) system is characterized by basically unchanged application; Common hardware and system software; The security equipment basically does not have a password s-mis (security management information system) system, which is characterized by common hardware and system software; PKI / Ca security system must have password
25
views
Energy and water supply departments
The structural protection level of key engineering construction and other units is applicable to the central level state organs, radio and television departments, important material reserve units, social emergency service departments, cutting-edge science and technology enterprise groups, national key scientific research institutions and national defense construction departments. Access verification protection level is applicable to key departments of national defense and units that need to implement special isolation of computer information systems according to law.
25
views
2) National standard for security
(gb17859-1999) specifies five levels of computer system security protection capability: user independent protection level, which is applicable to ordinary intranet user system audit protection level, which is applicable to business activities conducted through the intranet, and the security mark protection level of non important units requiring confidentiality, which is applicable to local state organs at all levels, financial institutions, posts and telecommunications
28
views
(authentication service, access control
integrity service, undeniable service)
8 specific security mechanisms (encryption mechanism, digital signature mechanism, access control mechanism, data integrity mechanism, authentication exchange mechanism, traffic filling mechanism, routing control mechanism, and notarization mechanism) and 5 universal security mechanisms (trusted functionality, security marking, event detection, security audit tracking, and security recovery).
26
views
Chapter 5 information security knowledge
Information system security and security system, information system security risk assessment, security strategy, password technology, access control, user identification and authentication, security audit, intrusion detection, network security, and application security. 5.1 information system security system 1) security system architecture ISO7498-2 describes five optional security services from the perspective of Architecture
27
views
Work area subsystem, horizontal area subsystem,
4.8 network planning and design network planning: network function requirements, network performance requirements, network operation environment requirements, network scalability and maintainability requirements, network design mainly adopts hierarchical method. Hierarchical design introduces the concept of three key layers in the communication of Internet components, namely, core layer, aggregation layer and access layer.
25
views
Risk cost includes tangible cost
Project risk management: risk management plan preparation risk identification qualitative risk analysis quantitative risk analysis risk response plan preparation risk monitoring risk management plan preparation input for risk management plan preparation: (1) project articles of association. (2) Project scope statement. (3) Project management plan. (4) Organizational process assets. (5) Environmental and organizational factors. Tools and techniques for risk management plan preparation
25
views
Project risks are classified according to
If the project owner risk, government risk, contractor risk, investor risk, designer risk, supervisor risk, supplier risk, guarantor risk and insurance company risk are classified according to the consequences bearers, 6. According to the predictability of risk, the risk can be divided into known risk, predictable risk and unpredictable risk.
26
views
Attributes of risk
1. Randomness of risk events 2. Relativity of risks 3. Variability of risks classification of risks: 1. Pure risks and speculative risks are classified according to risk consequences 2. Natural risks and man-made risks are classified according to risk sources 3. Manageable risks and unmanageable risks are classified according to whether the risks are manageable 4. Risks are classified according to risk impact scope and are classified according to impact scope, There may be local risks and overall risks.
25
views
People engaged in project management must understand what risks are.
Project risk: first, the risk is related to people's purposeful activities. Second, the risk is related to future activities and events. Third, if the consequences of the activities or projects are not ideal, or even fail, people always want to think: can we change the previous behavior or route and do a good job in the future activities or projects?In addition, when the objective environment or people's thoughts, policies or action lines change, the results of activities or projects will also change.
25
views
Risk impact; Risk status (open, occurred, avoided)
Risk occurrence sign; Risk elimination sign; Risk prevention strategy; Risk response strategies; Risk management of risk responsible person: formulate risk plan; Identify risks; Qualitative analysis of risks; Quantitative analysis of risks; Formulate risk response strategies; Risk tracking and monitoring people often mention risk, but not everyone has seriously considered the meaning of risk.
25
views
1. Project management plan 2. Communication management plan
3. Tools and technologies for organizing process asset project stakeholder management: 1. Communication methods 2Problem log: output of project stakeholder management: 1. Problem solving 2. Updated project communication management plan 3. Organizational process assets 2.12 definition of project risk management risk and risk tolerance risk: problems or opportunities; Risk type; Risk occurrence probability;
25
views
1. Work performance information 2. Project management plan
3. Forecast 4Approved change request 5. Tools and technologies for deliverables performance report: 1. Information presentation tool 2. Performance information collection and editing 3. Output of performance report of status review meeting: 1. Performance report 2. Forecast 3. Demand change 4Updated project management plan 5. Recommended corrective actions 6. Organizational process assets project stakeholder management input of project stakeholder management
25
views