Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Build a Project Schedule

Put tasks in sequence

Take Dependencies

  • One task controls the timing of another

    • predecessor
    • successor
  • Status

    • Finish-to-Start Dependencies
    • Finish-to-Finish Dependencies
      • Example: Custimize Features - Test Features
    • Start-to-Start Dependencies
      • Example: Write Draft - Review Draft
    • Start-to-Finish Dependencies
  • Which Task Controls the Other?

    • Decide

      • predecessor
      • successor
    • Does the start or finish date of the first task control the second task?

    • Does the predecessor control the start or finish of the successor?

Ch 04 - Network_solution.pdf, network_diagram.png

Ch 04 - Seq WBS.pdf; network_diagram.png

image-20241106101211097

image-20241106102233769

How to assign resources to tasks.

Sequence

  • Assign resources to work packages.
  • Do not assign resources to summary tasks or milestones

Work = Duration + Resource assignment units

Design features - duration estimate is 2 weeks

  • Resource 1, 80 hours
  • Resource 2, 80 hours

Then, total 160 hours

Duration = Work/resource assignment units

some task will not shorter with more people(ex, meeting)

Resource Availability

Other Resources

  • Materials
  • Equipment
  • Ancillary costs

ch04 - Assignments.pdf; assignments solution.pdf

  • ancillary: 英 /ænˈsɪləri/, 美 /ˈænsəleri/
    • adj. 辅助的, 附属的
    • n. 助手;随从

Learn to use millestones

ch04 - Milestone Solution.pdf

Make a realistics schedule

Realistic Schedule

  1. Build in a buffer
    1. estimate based on the hours people work on the project every day
  2. estimate based on how fast the assigned workers are
  3. Limit tasks to three
    1. assign work to each people no more than three tasks at a time to keep people productive
    2. If really assign more tasks, adjust assignments to reflect their decreased productivity
      1. add a note to schedule to document the change and reason

The closer the model to the reality, the easier it will be to keep the project on time.

ch04 - reality.pdf; reality solution.pdf

Understand the critical path

Critical Path

  • Definition: The longest sequence of tasks in yoru schedule.
  • Character: Don't have slack(float).

image-20241121202750112

  • Forward pass
  • Backward pass

ch04- critical exercise.pdf; critical solution.pdf

How to shorten a schedule

  • Want project sooner
  • Project is delayed

1. Fast tracking

  • Task overlap (normally one after another)

Fast-track tasks on the critical path

  • Fast tracking increases risk

2. Crashing

  • Definition: Spend additional money to shorten the schedule
  • Crash tasks on the critical path
  • Shorten the schedule for the least amount of money
  • Start with the least expensive tasks

紧急赶工

  • 花费额外资金以缩短工期
  • 加快关键路径上的任务
  • 用最少的钱缩短工期
  • 从最便宜的任务开始

crash table

  • Adding more people doesn't always shorten duration
    • People get in each other's way
    • New workers are often less productive
    • New workers may slow down current workers

Review the critical path after every adjustment

3. Cutting Scope

Ch 04 - Shorten ex.pdf, Shorten Solution.pdf

Decument the baseline

Project Baseline(Documents)

  • Baseline-Approved Requirements
  • Baseline-Approved Schedule
  • Baseline-Approved Budget

Everything want to control with Change Management Process

  • Baseline-Approved Requirements
  • Requirements
  • Project notebook

Baseline the values in the project schedule

Use baseline to evaluate progress and project performance.

Challenge: Network diagram

ch04 - chapter 04 challenge.pdf; network_solution.pdf

Question

  1. Which type of dependency is most common in project schedules?

    • finish-to-start

      This type of dependency is best here because it means the finish of one task controls the start of the next task.

  2. Now that your project is underway, all resource assignments are running late. What is the likely cause?

    • not taking into account the hours that resources spend on non-project work each day
Last Updated:
Prev
Project Plan
Next
Agile