Previous Topic: Develop Implementation PlanNext Topic: Construct a Flexible Schedule


Scheduling Implementation

Time frames can be established if the administrator has a good feel for the size of the task. But what is more often the case, is that the base of users and resources is an unknown quantity. It is also usually difficult to guess what will be uncovered as the implementation continues. A Security Administrator soon discovers that it is best to become generally knowledgeable of every system, applications and operations procedure, and facility in the shop. This is something that is not obvious until the inventory and design phases begin.