{"title":"网络安全领域的项目管理特点","authors":"Mariia Stadnyk, A. Palamar","doi":"10.33108/visnyk_tntu2022.02.054","DOIUrl":null,"url":null,"abstract":"This paper has presented detailed comparative analysis of the project manager work on IT and cybersecurity projects by each PMI project management process group: initiating, planning, executing, monitoring and controlling, and closing. Based on the results, a list of project management peculiarities in cyber security was obtained, and a list of industry knowledge and requirements for a cyber security manager was presented. Proposals for the application of tools and techniques for each process of the cyber security project were formed in accordance with the features.","PeriodicalId":21595,"journal":{"name":"Scientific journal of the Ternopil national technical university","volume":"74 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Project management features in the cybersecurity area\",\"authors\":\"Mariia Stadnyk, A. Palamar\",\"doi\":\"10.33108/visnyk_tntu2022.02.054\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper has presented detailed comparative analysis of the project manager work on IT and cybersecurity projects by each PMI project management process group: initiating, planning, executing, monitoring and controlling, and closing. Based on the results, a list of project management peculiarities in cyber security was obtained, and a list of industry knowledge and requirements for a cyber security manager was presented. Proposals for the application of tools and techniques for each process of the cyber security project were formed in accordance with the features.\",\"PeriodicalId\":21595,\"journal\":{\"name\":\"Scientific journal of the Ternopil national technical university\",\"volume\":\"74 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scientific journal of the Ternopil national technical university\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33108/visnyk_tntu2022.02.054\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific journal of the Ternopil national technical university","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33108/visnyk_tntu2022.02.054","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Project management features in the cybersecurity area
This paper has presented detailed comparative analysis of the project manager work on IT and cybersecurity projects by each PMI project management process group: initiating, planning, executing, monitoring and controlling, and closing. Based on the results, a list of project management peculiarities in cyber security was obtained, and a list of industry knowledge and requirements for a cyber security manager was presented. Proposals for the application of tools and techniques for each process of the cyber security project were formed in accordance with the features.