Providing a model for establishing information security project management (based on PMBOK standard)

Number of pages: 156 File Format: word File Code: 30463
Year: 2013 University Degree: Master's degree Category: Computer Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of Providing a model for establishing information security project management (based on PMBOK standard)

    Dissertation for M.Sc. degree.

    Computer engineering field - software orientation

    Thesis abstract (according to the abstract included in the thesis):

    Based on the topic of this thesis, it is better to start the abstract with a few questions to determine the importance of this thesis:

    1- Why is project management of great importance? Currently, the problem that exists in the process of optimal implementation of any project is the lack of timing management and its legal performance. However, with the expansion of project management science, this gap has been resolved in projects related to industrial engineering, and with the emergence of standards such as PMBOK, the final version of which will be published on 01/01/2013 (it is worth noting that its trial version was published by the American Project Management Organization), it has led to the creation of specialized courses PMP (Project Management Professional) and PMI (Project Management Institute), which are being conducted by the Project Management Association, which also has a branch in Iran. But there was this problem that these documents were issued to individuals and no organization had a valid management certificate until the ISO organization released the first standard under the title of ISO 21500 and awarded this certificate to organizations according to specific terms and conditions. Considering the progress of information technology science and the entry into the world of IT technology, this need was felt in order to be able to provide a solution for the management of information technology projects according to the project management standard. Therefore, the Iranian Petrochemical Industries Development Management Company for the first time presented a book on IT project management and was able to manage the information technology projects of its organization. Then, with the spread of this topic, several articles on the management of these types of projects were presented and recorded in various sources, including project management conferences, which were mostly conducted by the Ariana Industrial Research Group, which started in 2013. In this regard, researches and experiments were carried out, which unfortunately are less than the number of fingers. Although these articles solved the problems of the organizations to some extent, they also had many problems. 3- Why information security project management: In part 1 and 2, we realized that information technology project management for project integrity management, project scope management, project time management, project cost management, project quality management, human resource management, project communication management, project risk management, and project procurement management is of great importance according to PMBOK, and for the implementation of a successful project, the following factors must be always examined and completed its chart. But currently, no articles have been published on the integration of ISO 27000, which is the information security standard, with PMBOK regarding the management of information security projects, due to the high importance of this issue, and the need is felt that a group with expertise in information technology engineering and software engineering, as well as industrial engineers, can provide an intelligent solution in this regard and prepare a specific chart. The project manager should always be under the doubt and stress of what will happen if one day the programmer or any of the people involved in the project wants to leave the project.

    5 - Conclusion of the thesis: In this thesis, which has a practical aspect, we intend to guarantee by designing a specific method and flowchart that we can prevent any disruptions or problems in the process of information security projects. and optimize the three important factors of risk, quality and security.

    Why is project management of great importance? Currently, the problem that exists in the process of optimal implementation of any project is the lack of timing management and its legal performance.However, with the expansion of project management science, this gap has been resolved in projects related to industrial engineering, and with the emergence of standards such as PMBOK, the final version of which will be published on 01/01/2013 (it is worth noting that its trial version was published by the American Project Management Organization), it has led to the creation of specialized courses PMP (Project Management Professional) and PMI (Project Management Institute), which are being conducted by the Project Management Association, which also has a branch in Iran. But there was this problem that these documents were issued to individuals and no organization had a valid management certificate until the ISO organization offered the first standard under the title of ISO 21500 and awarded this certificate to organizations according to specific terms and conditions. Considering the progress of information technology science and the entry into the world of IT technology, this need was felt in order to be able to provide a solution for the management of information technology projects according to the project management standard. Therefore, the Iranian Petrochemical Industries Development Management Company for the first time presented a book on IT project management and was able to manage the information technology projects of its organization. Then, with the spread of this topic, several articles on the management of these types of projects were presented and recorded in various sources, including project management conferences, which were mostly conducted by the Ariana Industrial Research Group, which started in 2013. In this regard, researches and experiments were carried out, which unfortunately are less than the number of fingers. Although these articles solved the problems of the organizations to a certain extent, they also had many problems. 3 - Why information security project management: In part 1 and 2, we realized that information technology project management for project integrity management, project scope management, project time management, project cost management, project quality management, human resource management, project communication management, project risk management, and project procurement management according to PMBOK is of great importance and to implement a successful project, the aforementioned factors should always be considered. examined and completed the chart. But currently, no articles have been published on the integration of ISO 27000, which is the information security standard, with PMBOK regarding the management of information security projects due to the high importance of this issue, and the need is felt that a group with expertise in information technology engineering and software engineering, as well as industrial engineers, can provide an intelligent solution in this regard and prepare a specific chart. There should always be this doubt and stress that what will happen if one day the programmer or any of the people involved in the project wants to leave the project one day.

    5 - Conclusion of the thesis: In this thesis, which has a practical aspect, we intend to guarantee by designing a specific method and flowchart that by acting on it at the end of the topic, we can prevent any disruptions or problems in the process of carrying out information security projects. and optimize the three important factors of risk, quality and security.

    In this thesis, we intend to:

    (images are available in the main file)

    In the first part, we discuss project management based on the PMBOK standard, and we examine project management methods and express the determining factors in project management. In the second part, according to the conclusions from the first chapter, we discuss the management of information technology projects, which is called IT Security Mmanagement, and at the end of this section, according to the articles and authoritative references, we express project management in the framework of information technology and specify a solution in the form of a flowchart. In the section related to information security and the concepts of ISO 27000 and its branches, we discuss 10 issues of information security and express each of them based on the ISO 27000 standard. In the fourth part, we are going to introduce the discussion of information security into the project management flowchart that we have obtained from the third part, and by changing the project management method and adding parts to it, we have obtained the information security project management method flowchart, and we will test it on several key projects and record the results. In the fifth section, after drawing the information security project management flowchart, we will examine three important factors out of the nine PMBOK factors, which are risk, quality, and security, and determine the amount of progress or regression compared to the standard PMBOK project management flowchart in a table and diagram. Then, in the sixth section, we will conclude the proposed plan and its advantages and disadvantages

  • Contents & References of Providing a model for establishing information security project management (based on PMBOK standard)

    List:

    Abstract .. 1

    Introduction .. 3

    Research history .. 4

    Chapter one: Problem design. 20

    The second chapter: Project management. 36

    Chapter three: IT project management. 67

    Chapter Four: work method 79

    Chapter Five: A comprehensive review of the quality, security and risk of the information security project. 91

    Sixth chapter: Implementation of the proposed algorithm (case study) and conclusions. 111

    Seventh chapter: . 117

    Chapter Eight: sources. 158

     

    Source:

    Engineering of computer network security policies, authored by Dr. Nasser Mediri and engineer Farhad Taghizadeh Milani, Mehrgan Qalam Publications, 1390.

    Inactive Pad-Defend Engineering of Computer Networks, authored by Dr. Nasser Madiuri, Engineer Munirsadat Shah Velayati, Mehrgan Qalam Publications, 1390 edition,

    The best in information security, George El Estefank, translated and written by Dr. Alireza Pourabrahimi, Dr. Abbas Toloui Ashlaghi, Islamic Azad University Publications, Electronic Department, first edition summer 1389,

    Information Technology, Security Techniques - Ritual The work of information security management / Iran standard - ISO - IEC 27002 / Iran Institute of Standards and Industrial Research / 1st edition 1386

    Familiarity with ISMS and security standards ISO 27001 and ISO 27002 / written by Haider Ali Kurangi / December 1386 / the book is allowed to be used in scientific network seminars /

    Quality and Productivity Management, Dr. Parviz Fattahi, University Press Payam Noor, second edition, Azar 1388, Shabak 5-585-387-964-978

    Management and control of information technology projects, Jack T. Marchuka, translated by engineer Ramin Molanapour, engineer Farzad Habibipour Rudsari, second edition of March 1388,

    a comprehensive approach to the theory, application and design of management information systems (MIS), authored by Dr. Mehdi Beheshtian and engineer Hossein Abolhasani, Pardis Publications 57, second edition of 1379, pp. 446 and 447,

    project management guide, authored by Anjuman PMI project management, translator: Translators Seyed Hossein Usoli, Najabat, Ali Bayati, Hossein Naseri, Ali Afkhami, Tehran: National Petrochemical Industries Company, 1384 285 p.: Table.

    Strategic planning of information and communication technology, Ali Ahmadi, 1383 knowledge publication

    Article presenting a model for managing information technology projects based on PMBOK, Ahmadzadeh Qasimabadi

    Introduction to the country's information technology strategies, autumn 2013

    Information technology security guide, Secretariat of the Supreme Informatics Council, July 2014

    Group Ariana project management industrial research, organizer of project management conference in Iran

     

    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement / by W.Krag Brotby, CISM / CRC Press, Taylor & Francis Group, an informa business, 2009

    IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data / by Lance Hayden, Ph.D. / Mc Graw Hill, 2010

    Risk Analysis and Security Countermeasure Selection / by Thomas L. Norman, cpp/psp/csc / CRC Press, Taylor & Francis Group, an informa business, 2010 / ISBN 978-1-4200-7870-1

    Security Strategy: From Requirements to Reality / by Bill Stackpole and Eric Oksendahl / CRC Press. Taylor & Francis Group, an informa business, 2011

    Management Information Systems: James A.O' Brien, George M.Markas / Ninth edition / Mc Grow Hill / 2009

    http://www.smartKPIs.com / Top 25 Information Technology KPIs of 2010

    Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission./ Frederick T. Sheldon, Robert K. Abercrombie, Ali Mili /

    ISO/IEC 27001 & 27002 implementation guidance and metrics / Prepared by the international community of ISO 27k implementers at ISO27001security.com/ Version 1 28th June 2007

    Metrics for IT Services Managing / by Peter Brooks / Van Haren Publishing / 2006

    Social Engineering and The ISO/IEC 17799:2005 Security Standard: A Study on Effectiveness / by: Evangelos D. FrangopoulosFrangopoulos / March 2007 / University of South Africa, School of computing

    Using Cobit, ITIL and Other Frameworks to Achieve your IT Governance Requirements / by: Brain Broadhurst / www. Foxit.net

    ITIL V3 and Information Security / by : Jim Clinch / White Paper , May 2009

    http://www.27000.ir

    http://www.paydarymelli.ir

    http://gilascomputer.com

    Meryl K. Evans -Writing an RFP (Request for Proposal), http://EzineArticles.com/

    Bruce Morris- How to Write a Request for Proposal for a Web Project - http://brucemorris.com

    Meryl K. Evans -Writing an RFP (Request for Proposal), http://EzineArticles.com/

    Bruce Morris- How to Write a Request for Proposal for a Web Project - http://brucemorris.com

    http://www.olcsoft.com/select.htm

    Tom Randal & Lynn DeNoia - Principles of Effective IT Management, Clinical Professor, Rensselaer Polytechnic Institute (Hartford, CT campus)

    Karen Tate & Judy Calvert (2002) Creating Successful Projects Large IT Project Management in an Integrated Justice Environment, Presented by, Griffin Tate Group, Inc.

    Jeffrey L.

Providing a model for establishing information security project management (based on PMBOK standard)