logo logo


Project management features in the cybersecurity area

НазваProject management features in the cybersecurity area
Назва англійськоюProject management features in the cybersecurity area
АвториMariia Stadnyk, Andriy Palamar
ПринадлежністьTernopil Ivan Puluj National Technical University, Ternopil, Ukraine
Бібліографічний описProject management features in the cybersecurity area / Mariia Stadnyk, Andriy Palamar // Scientific Journal of TNTU. — Tern.: TNTU, 2022. — Vol 106. — No 2. — P. 54–62.
Bibliographic description:Stadnyk M., Palamar A. (2022) Project management features in the cybersecurity area. Scientific Journal of TNTU (Tern.), vol 106, no 2, pp. 54–62.
УДК

65.011.56:004

Ключові слова

cybersecurity, project manager, project management process group, knowledge areas, infosec domain.

This paper has presented detailed comparative analysis of the project manager work on IT and cybersecurity projects by each PMI project management process group: initiating, planning, executing, monitoring and controlling, and closing. Based on the results, a list of project management peculiarities in cyber security was obtained, and a list of industry knowledge and requirements for a cyber security manager was presented. Proposals for the application of tools and techniques for each process of the cyber security project were formed in accordance with the features.

ISSN:2522-4433
Перелік літератури
1. PMI (2022). PMBOK Guide [Online]. URL: https://www.pmi.org/pmbok-guide-standards/foundational/ PMBOK.
2. Andreichenko A. V., Horbachenko S. A., Dykyi O. V. Osoblyvosti upravlinnia proiektamy u sferi kiberzakhystu. Cybersecurity. Vol. 2 (10). 2020. P. 45–51.
3. ISO-ISO/IEC 27001:2013. Information Technology. Security Techniques. Information Security Management Systems. Requirements. 2022. URL: https://www.iso.org/standard/54534.html.
4. Information Security Management System ISMS. 2022. URL: https://www.isms.online/information-security-management-system-isms/.
5. ISO-ISO/IEC 27037:2012. Information Technology. Security Techniques. Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence. 2022. URL: https://www.iso.org/standard/ 44381.html.
6. Antunes M., Maximiano M., Gomes R. J., Pinto D. Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal, Journal of cybersecurity and privacy. Vol. 1. 2021. P. 219–238.

7. Mubarak S., Heyasat H., Wibowo S. Information Security Models are a Solution or Puzzle for SMEs? A Systematic Literature Review. In Proceedings of the Australasian Conference on Information Systems. 2019. P. 148–154.

8. Ozkan B. Y, Spruit M. Cybersecurity Standardisation for SMEs: The Stakeholders’ Perspectives and a research agenda. Int. J. Stand. Res. Vol. 17. P. 41–72.
9. Weaver P. (2010). Understanding Programs and Projects Oh, There's a Difference! Paper presented at PMI® Global Congress. URL: https://www.pmi.org/learning/library/understanding-difference-programs-versus-projects-6896.
10. Luke Irwin (2019) The 8 CISSP domains explained. URL: https://www.itgovernance.co.uk/blog/the-8-cissp-domains-explained.
11. Pro osnovni zasady zabezpechennia kiberbezpeky Ukrainy: Zakon Ukrainy № 2163-VIII, redaktsiia vid 03.07.2020. 2020. URL: https://zakon.rada.gov.ua/laws/show/2163-19#Text.

 

References:
1. PMI (2022). PMBOK Guide [Online]. URL: https://www.pmi.org/pmbok-guide-standards/foundational/ PMBOK.
2. Andreichenko A. V., Horbachenko S. A., Dykyi O. V. Osoblyvosti upravlinnia proiektamy u sferi kiberzakhystu. Cybersecurity. Vol. 2 (10). 2020. P. 45–51.
3. ISO-ISO/IEC 27001:2013. Information Technology. Security Techniques. Information Security Management Systems. Requirements. 2022. URL: https://www.iso.org/standard/54534.html.
4. Information Security Management System ISMS. 2022. URL: https://www.isms.online/information-security-management-system-isms/.
5. ISO-ISO/IEC 27037:2012. Information Technology. Security Techniques. Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence. 2022. URL: https://www.iso.org/standard/ 44381.html.
6. Antunes M., Maximiano M., Gomes R. J., Pinto D. Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal, Journal of cybersecurity and privacy. Vol. 1. 2021. P. 219–238.

7. Mubarak S., Heyasat H., Wibowo S. Information Security Models are a Solution or Puzzle for SMEs? A Systematic Literature Review. In Proceedings of the Australasian Conference on Information Systems. 2019. P. 148–154.

8. Ozkan B. Y, Spruit M. Cybersecurity Standardisation for SMEs: The Stakeholders’ Perspectives and a research agenda. Int. J. Stand. Res. Vol. 17. P. 41–72.
9. Weaver P. (2010). Understanding Programs and Projects Oh, There's a Difference! Paper presented at PMI® Global Congress. URL: https://www.pmi.org/learning/library/understanding-difference-programs-versus-projects-6896.
10. Luke Irwin (2019) The 8 CISSP domains explained. URL: https://www.itgovernance.co.uk/blog/the-8-cissp-domains-explained.
11. Pro osnovni zasady zabezpechennia kiberbezpeky Ukrainy: Zakon Ukrainy № 2163-VIII, redaktsiia vid 03.07.2020. 2020. URL: https://zakon.rada.gov.ua/laws/show/2163-19#Text.

 

Завантажити

Всі права захищено © 2019. Тернопільський національний технічний університет імені Івана Пулюя.