Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Develop a Project Plan

Project planning overview

identifies the works must be done.

break the work down to make it easy to manage.

once have tasks list, then decide:

  • Who?
  • Estimated time?
  • Estimated cost?

Project Plan

  • Used over the course of the project
  • Directs people's tasks
  • Tracks project's progression
  • Aids in course corrections
  • Communicates progress with stakeholders

Work Breakdown Structure(WBS)

image-20240528233314184

  • Easier to estimate time and cost.
  • Easier to assign work.

image-20240528233504839

  • WBS(two type of tasks)
    • Summary tasks
      • Higher-level tasks in WBS
      • The quantity of levels depends on project complexity
    • Work packages
      • Lowest level in WBS

Build a work Breakdown structure

image-20240716210020322

Work Packages

  • Break down in eight-to-eighty-hour tasks
  • Match to frequency of status reports

Determining Breakdowns

  • Time and cost are easy to estimate
  • Status is easy to measure
  • Task durations are shorter than reporting periods
  • Details are manageable

How to create work packages

  • Defining work packages
  • Create work package documents

Level of Detail

  • Familiarity of work
  • Experience of the team member

Cho3-work package solution.pdf

Estimate time and cost

  • Core planning team
  • Team members

Time Estimates

image-20240716213433878

image-20240716213554947

Parametric Model

Calculate work and cost based on a measured unit.

Delphi Technique

For large project, Top-Down estimate works well.

How to choose the best estimate

Choosing Estimate Values

Adjust your Estimate

  • A highter value increases the chance of success
  • A lower value decreases the chance of success

Choose the estimate with an acceptable probability of success

Ch03 -Best Estimate.pdf

Create a resource management plan

  • Roles
  • Responsibilities
  • Reporting structure
  • Skills
  • Staffing

RICA

  • Responsible for doing
  • Needs to be Informed
  • Consult before a decision
  • Accountable for decisions and delegatioins

image-20240718133359070

image-20240719130507803

Staffing Plan

  • Identify sources for resources
  • When are they needed
  • Training requirements
  • Resource processes

Ch03 - Responsibility_Matrix.xlsx

Build a project schedule

  1. Put tasks in sequential order
  2. Estimate the time each task will take.
  3. Assign tasks to project team members
  4. Calculate task duration
  5. Account for deadlines and other constrains.

image-20240719125830536

Develop a project budget

  • Labor
    • Vendors
    • Contractors
    • Employees
  • System
  • Other(travel)
  • Contingency
  • Total

Burdened Cost

For Employees

  • Salary
  • Benefits

Time-Based Resources

  • Rental equipment
  • Leased office space

Materials

  • Equipment being installed
  • Construction materials
  • Consumable goods

Ancillary

  • Travel
  • Training
  • Fees

Assign resources and other costs to the tasks in your project schedule.

Money Allocated

If estimate is high:

  • Eliminate nonessential expenses
  • Use less expensive resources
  • Cut scope

Hospital Scheduling Project

image-20240721004241884

Ch03- Best Estimate.pdf

Identify risks

Known Unknows

  • Weather delays
  • Unavailable resources
    • Technology
    • Time Zone
    • relationship
    • deliverables
    • limited options
  • Unknown unknows
    • unforeseeable events
    • contingency funds (应急费用)

Project Budget/Schedule

image-20241029002116858

some 15% according to experience, and depends on situation

Ch03-Risk Information Form Template.docx

create rish information sheet

Create a risk management plan

Evaluate Rish

  • How likely?
  • How serious?
Probability1 low3 medium5 high
Impact1 low3 medium5 high
  • Unlikely and not serious 1 x 1 = 1
  • Medium likely and serious 3 x 3 = 9
  • Very likely and serious 5 x 5 = 25

Avoid Rish

  • Changing project scope

Mitigate Rish

  • Reducing impact

Transfer Risk

  • Handing risk to someone else

  • Your response to the risk should reflect the impact of the risk.
  • Review and update the risk management plan regularly

Ch03 - Risk log template.xlsx

Set up a communication plan

  • identify your audiences(who should know)
  • Who, What, How
    • Who - management
      • What - objective
      • How - Project plan, Status reports, Expenditures, Closeout report
    • Who - Sponsor
      • What - Objective
      • How - Weekly 1:1
    • Who - Functional managers
      • What - Skill sets, Milestones, Constraints, Schedules
      • How - Bi-weekly email
    • Who - Team
      • What - Assignments, Upcoming tasks, Changes, Best Practices
      • How - Weekly emails

Communication Distribution

  • Frequency
  • Fromat (face to face, email)

Develop a quality plan

Quality

  • Meeting customer's requirements on time and within budget
  • Conforming deliverables to specifications

image-20241029004337095

  • Quality Standard(can't be lower)
  • Longer scheduling Increased cost(can't be higher)

Quality Assurance Plan

Processes needed to meet quality standards

Quality Control

Measure and monitor quality of final deliverables

  • Acceptance test
  • Inspection
  • Peer review
  • Walk-through
  • Audit

Tools for quality improvement

Cost-Effective Diagrams(Fish-bone diagrams)

image-20241029004920551

facts may lead the problems

image-20241029005219015

Develop Quality Management Plan

Ch03 - Quality.pdf

How to set up a change

  1. Identify what you want to control
    1. Components
      1. Project scope
      2. Requirements
      3. Schedule
      4. Project plan
    2. Baseline documents(control version)
      1. requirements approved by stakeholders is the baseline
      2. New requirement
        1. Change management process
          1. Decide whether to accept the change or deny it.
        2. decided by Change Review Board
          1. made up with key stakeholders
  2. Define a change management process
    1. depends on
      1. Company culture
      2. Project size
    2. Components
      1. Receive change request
      2. Evaluate change request
        1. Effect, Cost, Impact, Risk
      3. Change review board reviews evaluated change requests
        1. accpet or reject
        2. ask for more detail or revision
      4. Track change request
    3. Result
      1. Update baseline document to reflect the change
    4. Additional Considerations
      1. Setting thresholds
        1. project manager can decide small change
      2. Emergency changes

image-20241105234456915

  • Ch03 - CR Form.pdf
  • Ch03 - Change Solution.pdf

How to plan procurement

procurement plan

  1. Identify purchase needs
    1. Skills
    2. Additional resources
    3. Products
    4. Materials
  2. Document procurement processes
    1. Identify vendors
    2. Select vendors
    3. Manage contracts
  3. Describe the make-or-buy decision process
    1. Understand needs
    2. Determine if products are available
    3. Determine suitability
  4. List potential vendors
    1. Describe research
    2. Criteria for list

Procurement Plan

  • Find out what to do first
  • Give yourself a confidence boost
  • Build a growth mindset for happiness
  • Create balance and overcome burnout

How to obtain approval to procceed

  • face-to-face sign off meeting is more effective

arrange specific meeting for approval

Plan Approval

  • Present plan
  • Ask for signatures
    • after present, once agreed

Challenge: Change

Ch 03 - Chapter 03 CR Form.pdf

Last Updated:
Prev
First Things
Next
Project Schedule