Term
|
Definition
A program that delivers instructions to indevifuals for carrying out the implementation stage of the security systems development life cycle |
|
|
Term
|
Definition
A completed document or program module that can serve either as the beginning point for a later task or as an element in the finished product. |
|
|
Term
|
Definition
An individual or skill set whose function is detailed in a project plan. |
|
|
Term
|
Definition
A specific point in the project plan when a task and its action stops are complete and have a noticable impact on the progress of the project plan as a whole. |
|
|
Term
|
Definition
In a project plan, that tasks or action steps that come before the sppecific task at hand. |
|
|
Term
|
Definition
In a project plan, that tasks or action steps that come after the task at hand |
|
|
Term
|
Definition
Synonymous with economic feasability study. The comparison of the cost of protecting an asset with the worth of the asset or the costs of the compromise of an asset. |
|
|
Term
|
Definition
Synonymouse with cybernetic loop. A process to manage a project that ensures that progress is measured periodically and that measured results are compred to expected results. |
|
|
Term
|
Definition
A modification to work pratices that involves stopping the old method and beginning the new. |
|
|
Term
|
Definition
An approach to implementing new security systems that involes roling out a piece of a new system accross the entire organization |
|
|
Term
|
Definition
The changing of work pratices that involves implementing all security improvments in a single office, department, or division, and resolving issues within that group before expanding to the rest of the organization. |
|
|
Term
|
Definition
A method of modifying work practices that involves using the new methods alongside the old methods. |
|
|
Term
|
Definition
A proven method for prioritizing a program of complex cange whose fundamental concept is that issues are addressed from the general to the specific and that the focus is on systemic solutions instead of indicidual problems. |
|
|
Term
|
Definition
A complex process that an organization uses to manage the impacts and costs caused by technology implementation, innovtion, and obsolescense. |
|
|
Term
|
Definition
Authorizes an IT system to process, store, or transmit information. |
|
|
Term
|
Definition
The comprehensive evaluation of the technical and nontechnical security controls of an IT system to support the accredidation process that establishs the extent to which a particular design and implementation meets a set of specified security requirements. |
|
|