7 - MIU-SWE 321-Spring 2024-Students-1
7 - MIU-SWE 321-Spring 2024-Students-1
Computer
Science
Software Project
Management
(SWE 321)
Risk management
is concerned with
identifying risks and
drawing up plans to
minimise their effect
on a project.
(Cause)
Man Natural
Made Risk Made
Categories Non-
Human Human
(Impact)
(Cause)
(Impact)
(Cause)
Risk Non-
Human
Categories Human
(Impact)
Example of Risk Categories
• Human – Illness, death, injury, or other loss of a key
individual.
• Natural – Weather, natural disasters, or disease.
• Operational – Disruption to supplies and operations,
loss of access to essential assets, or failures in
distribution.
• Reputational – Loss of customer or employee
confidence, or damage to market reputation.
• Procedural – Failures of accountability, internal
systems, or controls, or from fraud.
Example of Risk Categories
• Project – Going over budget, taking too long on key
tasks, or experiencing issues with product or service
quality.
• Financial – Business failure, stock market
fluctuations, interest rate changes, or non-availability
of funding.
• Technical – Advances in technology, or from
technical failure.
• Political – Changes in tax, public opinion,
government policy, or foreign influence.
Risk
Management
process
Risk Management process
Risk Management process
Risk Management process
Assessment
Action
Risk Management process
Risk Management process
Step I: Identify the risks
In this step,
you’ll identify individual
risks that might affect your
project by making a list (or
spreadsheet) of risks that
might arise.
Step I: Identify the risks
In this step,
you’ll identify what could
go wrong and what its
consequence.
Step I: Identify the risks
Examples of common project risks:
• implementing a new technology program for
the project,
• having a poorly defined project objective or
deliverable, and
• not having adequate measures to protect the
health and safety of project team members.
Step I: Identify the risks
The main output of risk identification is a list of
identified risks and other information needed
(likelihood - Source(s) – Impact (consequences).
Risk Impact
Task Source(s)
(likelihood) (consequences)
Step I: Identify the risks
The main output of risk identification is a list of
identified risks and other information needed
(likelihood - Source(s) – Impact (consequences).
Risk Register
Step I: Identify the risks
Risk Register
is a document that contains results of various risk
management processes; it is often displayed in a
table or spreadsheet format.
• Risk analysis is the process that figures out how likely risk
will arise in a project. It studies the uncertainty of
potential risks and how they would impact the project in
terms of schedule, quality and costs.
Step II: Analyze the risks
In this step,
you need to know:
• What are the causes of the
event or the factors in its
occurrence? (causes)
• What exactly would happen if this event
occurred? (consequences)
• How likely is this event to happen?
(likelihood)
Step II: Analyze the risks
quantitative or qualitative
• Quantitative risk analysis uses mathematical
models and simulations to assign numerical
values to risk.
Risk analysis
• Qualitative is often
risk analysis both
relies on a person's
subjective judgment to build a theoretical model
of risk art
anfor a givenand ascience
scenario.
Step II: Analyze the risks
Risk analysis based on:
quantitative or qualitative
Qualitative risk analysis is the most
analysing tool used.
This two-dimensional technique is used
to rate probability (likelihood) and
impact (consequences).
Step II: Analyze the risks
Risk Management process
Step III: Evaluate the risks
“Plan-Do-Check-Act” is
another helpful method
in implementing a
solution.
Step V: Monitor and
Review the risks
Access
Level
System User Number of Home Geographic
(Read,
name Category users Organization Location
Write,
Full)
Regular Read/
XYZ 10 ABC Group Atlanta
user Write
Risk Identification and
Assessment
Threat Identification
• Develop a catalogue of threat sources.
Briefly describe risks that could negatively
affect the organization’s operations, from
security breaches and technical missteps to
human errors and infrastructure failures:
For example:
Risk Identification and
Assessment
Threat source Threat action
• Web defacement
• Social engineering
Cyber criminal
• System intrusions (break-ins)
• Identity theft
Risk Identification and
Assessment
Threat source Threat action
• Browsing of personally
identifiable information
• Unauthorized system access
• Accidental or ill-advised
Malicious insider
actions taken by employees
that result in unintended
physical damage, system
disruption or exposure
Risk Identification and
Assessment
Threat source Threat action
• Illness, death, injury or other
Employees
loss of a key individual
• Loss of confidence from
employees
Reputation
• Damage to the reputation of
the company
• Natural or man-made
Environmental
disasters
Risk Identification and
Assessment
Threat source Threat action
Organizational
(planning, schedule,
estimation, • Improper worker termination
controlling, and reassignment actions
communication,
logistics, resources
and budget)
Risk Identification and
Assessment
Threat source Threat action
Legal and • Regulatory penalties
administrative actions • Criminal and civil proceeding
• Malicious code (e.g., virus)
• System bugs
• Failure of a computer, device,
Technical application, or protective
technology or control that
disrupts or harms operations
or exposes the system to harm
Risk Identification and
Assessment
Vulnerability Identification
• Assess which vulnerabilities and weaknesses
could allow threats to breach your security.
For example:
Risk Identification and
Assessment
Vulnerability Description
Unintentional
but controls are in place
errors and
that may impede
omissions
successful exercise of
the vulnerability.
Risk Identification and
Assessment
Level Probability Definition Example
The threat source lacks
motivation or capability,
or controls are in place IT disruptions due
Low to prevent, or at least to natural or man-
significantly impede, the made disasters
vulnerability from being
exercised.
Risk Identification and
Assessment
Impact Analysis
• Perform risk impact analysis to understand
the consequences to the business if an
incident happens.
• Risk analysis can include qualitative risk
assessments to identify risks that pose the
most danger, such as data loss, system
downtime and legal consequences.
Risk Identification and
Assessment
Impact Analysis
• Perform risk impact analysis to understand
the consequences to the business if an
incident happens.
• Quantitative risk assessment is optional and
is used to measure the impact in financial
terms.
Risk Identification and
Assessment
Incident Consequence Impact
The loss of confidentiality with
major damage to organizational
assets.
Unauthorized
The incident may result in the
disclosure of
costly loss of major tangible High
sensitive
assets or resources, and may
information
significantly violate, harm or
impede the organization’s
mission, reputation or interests.
Risk Identification and
Assessment
Incident Consequence Impact
The loss of availability with a
IT disruptions serious adverse effect on
due to organizational operations.
unauthorized The organization is able to Medium
changes to perform its primary functions, but
the system the effectiveness of the functions
is significantly reduced.
Risk Identification and
Assessment
Incident Consequence Impact
The loss of integrity with a limited
Non-sensitive
effect on organizational
data is lost by
operations assets, or individuals.
unauthorized
The organization can perform its Low
changes to
primary functions, but the
the data or
effectiveness of the functions is
system
noticeably reduced.
Risk Identification and
Assessment
Risk Level Evaluation
• During this step, the results of the risk
analysis are compared to the risk evaluation
criteria. The results are used to prioritize
risks according to the level of risk.
Risk Identification and
Assessment
Level of
Risk Level Definition
Impact
There is a strong need for corrective
measures. The system may continue
High to operate, but a corrective action
plan must be put in place as soon as
possible.
Risk Identification and
Assessment
Level of
Risk Level Definition
Impact
Corrective actions are needed and a
plan must be developed to
Moderate
incorporate these actions within a
reasonable period of time.
Risk Identification and
Assessment
Level of
Risk Level Definition
Impact
The system’s owner must determine
Low whether corrective actions are still
required or decide to accept the risk.
Risk Identification and
Assessment
Risk Assessment Results
• List the risks in the Risk Assessment Results
table.
• The report should describe the threats and
vulnerabilities, measure the risk, and
provide recommendations for control
implementation.
Risk Identification and
Assessment
Threat Vulnerabilities
Hurricane Power outage