Question

In: Computer Science

Question 3: Risk Management [50 marks] Risk management was identified in the NamCode as being an...

Question 3: Risk Management [50 marks]

Risk management was identified in the NamCode as being an important activity during governance.

a) Outline how you would develop a risk management program in IT [25 marks]

b) Critically evaluate the strengths and weakness of the various risk analysis methods in IT. [25 marks]

Solutions

Expert Solution

3)a)Developing an effective Risk Management Plan can help keep small issues from developing into emergencies.Risk management is the procedure that an organization follows to protect itself, its staff, clients, and volunteers. This is an ongoing process.

STEPS IN THE RISK MANAGEMENT PROCESS

1)Establish your context

Identify, assess, and document potential risks. This involves mapping the following: social scope of risk management (what are your stakeholders facing); the identify and objectives of stakeholders (do you want to ensure minimal financial impact, programmatic impact, etc.)

2)Identify risks

What are your risks and how likely are they to occur? Some will cause major disruption while others will be a minor irritation. You must make an educated assessment of both the likelihood and potential severity of each risk to prioritise your planning efforts.

3)Minimise or eliminate risks

Once risks have been identified you need to either eliminate or minimise those risks. You should provide specific strategies for minimising risk for each of the six subgroups.

4)Potential risk treatments- how will you manage the risk?

Once the risks have been identified, it is important to outline the courses of action to address these. Possible scenario/solutions:

1. Avoidance (elimination): Includes not performing an risky activities, i.e changing the travel routes, avoiding areas deemed unsafe, etc.

2. Reduction (mitigation): Involves methods that reduce the severity of the loss e.g. equipping staff with health and safety kits, keeping emergency numbers, fire equipment, backing up files, etc.

3. Retention: Involves accepting the loss when it occurs.

4. Transfer: Means causing another party to accept the risk. This can be typically done through insurance, outsourcing services, etc.

5)Prepare a risk management plan

A risk management plan can help minimise the impact of cash flow issues, damage to brand and other risks. It will also help create a culture of sensible risk awareness and management in your business. Our Crisis planning for business template below includes a risk management plan.

3b)Strength

1)Risks are sorted by their financial impact, assets by their financial value

2)The results can be expressed in a specific management terminology

3)The evaluation and the results are based on objective methods

4)Security level is better determined based on the three elements: availability, integrity and confidentiality

5)A cost-analysis can be implemented for choosing the best suited measures

6)Management performance can be closely watched

7)Data accuracy improves as the organization gains experience

Weaness

1)The methods of calculation are complex

2)Without an automatic tool the process can be really difficult to implement

3)There are no standards and universally accepted information for implementing this method

4)The values of risk impacts are based on subjective opinions of people involved

5)The process handles a long time

6)The results are presented only in monetary values and are hard to understand by persons without experience

***********************************************************************************************************************************

In case of any doubt do ask in the comment section.Hope you like it


Related Solutions

Question 2: Strategic Management of IT [50 marks] The strategic management of IT can be achieved...
Question 2: Strategic Management of IT [50 marks] The strategic management of IT can be achieved through the use of various resources. a) With the aid of examples, discuss the role played by policies and procedures in the strategic management of IT. [25 marks] b) Propose and discuss the aspects that should be considered during the drafting of an Information Security policy document [25 marks]
Question 3: (4 Marks) Explain the four ways that management can use to respond to risk....
Question 3: Explain the four ways that management can use to respond to risk. Provide an example for each of them.
Question One (20 Marks) Management of AG Travel and Tour has identified two groups of individuals...
Question One Management of AG Travel and Tour has identified two groups of individuals that would be interested in the vacation package consisting of room and board and/or entertainment. The maximum amount that group 1 is willing to pay for room and board is GHC 2500 and for entertainment is GHC 500. For group 2, the maximum amount they are willing to pay for room and board is GHC 1800 and for entertainment is GHC 750. Although AG Travel and...
Question 1 (50 marks) Given the following attributes in a project management • Project scope &...
Question 1 Given the following attributes in a project management • Project scope & feasibility • Documentation • Project planning • Testing and piloting • Risk minimization Discuss briefly each of them and on how would you use them as the IT manager for the company. Provide a details information support your discussion. [50 marks] Guideline: Plan and deploy a project and Integrate with this 5 elements. Example: Wi-Fi project, infrastructure project, server project and etc… Students are expected to:...
Discuss the following related to property management process: (3 Marks) Inherent risk assessment Control risk assessment...
Discuss the following related to property management process: Inherent risk assessment Control risk assessment Analytical procedures Answer: Explain disclosure assertions issues related to investments Audit? (2.5 Marks) Answer: For each of the following substantive procedures, first note whether it is a test of details of transactions or a test of details of account balances. Then decide for which assertion the test provides the best evidence. (2.5 Marks) Trace large cash receipts and payments to the source documents and the general...
Question 3 - Week 6 (11 marks) A new company, is being established to manufacture and...
Question 3 - Week 6 A new company, is being established to manufacture and sell an electronic tracking device: the Trackit. The owners are excited about the future profits that the business will generate. They have forecast that sales will grow to 2,600 Trackits per month within five months and will be at that level for the remainder of the first year. The owners will invest a total of $250,000 in cash on the first day of operations (that is...
Question 3 - Week 6 (11 marks) A new company, is being established to manufacture and...
Question 3 - Week 6 A new company, is being established to manufacture and sell an electronic tracking device: the Trackit. The owners are excited about the future profits that the business will generate. They have forecast that sales will grow to 2,600 Trackits per month within five months and will be at that level for the remainder of the first year. The owners will invest a total of $250,000 in cash on the first day of operations (that is...
DISCUSSION QUESTION 3-1 MB670 Project Management Lesson 3: Project Management Information Discussion Question 1 (50 points)...
DISCUSSION QUESTION 3-1 MB670 Project Management Lesson 3: Project Management Information Discussion Question 1 (50 points) Discuss at least 10 common features of project management information systems. In your opinion, which of these are the most important? (50 points)  (A 2-page response is required.)  
Question 3 (50 pts) The following data show the information of “sex” and “being afraid of...
Question 3 (50 pts) The following data show the information of “sex” and “being afraid of walking at night for 12 respondents.” Based on the data, answer the following questions, Case #                         Sex                              Afraid of walking at nights 1                                  Male                                        No 2                                  Male                                        No 3                                  Male                                        No 4                                  Female                                    Yes 5                                  Female                                    Yes 6                                  Male                                        No 7                                  Female                                    Yes 8                                  Female                                    Yes 9                                  Female                                    No 10                                Male                                        Yes 11                                Female                                    No 12                                Female                                    No 1.)Produce the crosstabulation, be sure...
Question 1 Identify the risk management technique being adopted in the following cases. A.Understanding that WIFI...
Question 1 Identify the risk management technique being adopted in the following cases. A.Understanding that WIFI signal may have harmful effect on human health, you continue setup a WIFI system at home. B.Worrying that the banking system may collapse, you put all your money under your bed. C.You put on a screen protector and a cover on your phone. D.When you go travel, you select an airline company which is highly ranked in terms of safety. Question 2 Explain whether...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT