Risk Analytics (IMT) - Chapter 12
Risk Analytics (IMT) - Chapter 12
Analytics
Project Risk
Management
Chapter 12
LOs
• Define threats
• Describe vulnerabilities
• Define exploits
• Discuss ways to maintain compliance
Threats
Threat can be defined as a situation or condition that may cause harm
if it goes unnoticed. It is an action or inaction which leads to harm, loss
or damage. Threats can lead to:
Threats
Threats
Threats
Interception: Interception means an unauthorised employee has
gained access to the project data. Stealing data, overhearing
others communication are examples of interception.
Interruption: Interruption means project data becomes
unavailable or unusable or gets destroyed. Losing a file, denial of
service are examples of interruption.
Modification: Modification means an unauthorised change in
project data or tampering with it. Alteration of data, modification
of project schedules are examples of modification.
Fabrication: Fabrication means additional data or activities are
included in the project that did not exist earlier. Adding a
password to a system, making additions to project scope are
examples of fabrication.
Unintentional and
Intentional Threats
Unintentional threats are the accidental threats which are
performed without any malicious intent. They may include:
Unintentional and
Intentional Threats
Intentional threats are the threats caused due to decisions made
with malicious intent. Such a threat may be carried out by one or
more persons in a project/organisation. Modification in the database
of an organisation by a disgruntled employee is an example of
intentional threat. Often intentional threats are motivated by greed,
anger or revenge.
Best Practices to
Manage Threats
Best Practices to
Manage Threats
Best Practices to
Manage Threats
Vulnerabilities
• Vulnerability can be defined as a weakness or a flaw which is
inherent in a project. It mainly develops the probability of causing
harm to the execution of a project.
• A vulnerability can result in risks but does not lead to loss on its
own. The loss occurs when a vulnerability is exploited by a threat,
which is also known as threat/vulnerability pair. Thus, losses are
experienced when both threats and vulnerabilities are paired.
Vulnerabilities
Threat Vulnerability Harmful Event or
Loss