logo

IT Project Management

   

Added on  2023-04-21

9 Pages1739 Words307 Views
Running head: IT PROJECT MANAGEMENT
IT Project Management
Nick Curran
Western Governor’s University

1IT PROJECT MANAGEMENT
Task 3:
Xemba Translations
A. Risk Assessment
Risk 1 Risks with project security
Description This involves different working equipment like files, laptops and
phones. They are protected from physical damage and theft. Besides,
they are employee working from home and this is quite impossible.
Likelihood of
Occurrence
Medium
Degree of impact Undesirable
Initial Action Taken This introduces the various risks of security to various security
services. This includes availability, integrity and confidentiality. The
managing and analyzing of the potential security risks at previous
stages of executing projects also helps companies to minimize to
avoid those security risks. Checking for backups within case files as
the computer gets stolen (Nguyen, Nguyen & Nguyen, 2015).
Team Member
Responsible
Phoebe
Prevention and
mitigation strategies
Assuring the documents that are stored at home. This is present in
digital format. Moreover, it is also backed up.

2IT PROJECT MANAGEMENT
Risk 2 Risks with software licensing
Description As the laptop is used by employee for use of business consist of
unlicensed software, the business is able to suffer the economic losses
as fines.
Likelihood of
Occurrence
High possibility
Degree of impact Undesirable
Initial Action Taken At any point, one can be audited. The companies are required to be
aware of the audits. Here, the software is costly to be wasted. Here,
the second risk come from the unmanaged software licensing that has
been overspending (Lechler & Yang, 2017). As the risk is not
determined, the business must assure application that is installed for
employee computers get licensed.
Team Member
Responsible
Willis
Prevention and
mitigation strategies
Assuring that every computer is utilized by telecommuters having
constant updates of software. Here, the users are not permitted in
installing the un authorizes applications.
Risk 3 Risks with cyber security

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Xemba Translations Risk Assessment & Project Performance
|8
|1774
|95

Security and Privacy of Employee Data | Report
|34
|6311
|63