logo

Risk Management for Desklib - Study Material Library

This assignment is about managing project risk in the field of business, accounting, and finance. The tasks involve determining risk objectives and standards, establishing project risk context, identifying project risks, classifying risks, analyzing and qualifying risks, determining risk priorities, documenting risk analysis outcomes, identifying existing risk controls, determining risk treatment options, and implementing risk treatments.

25 Pages3011 Words197 Views
   

Added on  2023-06-04

About This Document

This article discusses Risk Management in Desklib, an online library for study material with solved assignments, essays, dissertation etc. It covers topics such as risk assessment, risk register, risk mitigation, risk context, identifying risk tools, changes to make the database and framework robust, and more.

Risk Management for Desklib - Study Material Library

This assignment is about managing project risk in the field of business, accounting, and finance. The tasks involve determining risk objectives and standards, establishing project risk context, identifying project risks, classifying risks, analyzing and qualifying risks, determining risk priorities, documenting risk analysis outcomes, identifying existing risk controls, determining risk treatment options, and implementing risk treatments.

   Added on 2023-06-04

ShareRelated Documents
Running Head: RISK MANAGEMENT
Risk Management
Name of the Student
Name of the University
Author Note
Risk Management for Desklib - Study Material Library_1
2RISK MANAGEMENT
Table of Contents
Page 96 to 99.......................................................................................................................3
Page 107...............................................................................................................................4
Page 111 to 113...................................................................................................................5
Risk Register........................................................................................................................9
Risk Action Plan................................................................................................................21
Risk Action Plan 1.........................................................................................................21
Risk Action Plan 2.........................................................................................................21
Risk Action Plan 3.........................................................................................................22
Risk Action Plan 4.........................................................................................................22
Reference...........................................................................................................................24
Risk Management for Desklib - Study Material Library_2
3RISK MANAGEMENT
Page 96 to 99
Q1. Risk assessment entail
Risk entail helps us in calculating the risks that are present and might affect. Risk entail
also proves the processing off the data orientation system. The module members of the developer
performs the prosecution of the Australian Privacy Principles. The security operation is
performed with the assistance of the data orientation and this is the main reason that the
implementation of the business coordination will be performed in a better way. This is the main
reason that the processing of the tracking of the data will be managed with high security.
Q2. A. Risk Register
Q3. D. Magnitude and Probability
Q4. B. Resources aligned to handling the risk
Q5. C. Weaknesses
Q6. A. Probability Impact Matrix
Q7. B. SWOT Analysis
Q8. E. System failure models
Q9. C. Execution
Q10. A. Perform Quality Risk Analysis
Q11. A. Perform Qualitative Risk analysis
Q12. A. Exploit
Risk Management for Desklib - Study Material Library_3
4RISK MANAGEMENT
Q13. C. Risk Mitigation
Q 14. B. Interview
Q15. D. Mitigate
Q16. B. Mitigate
Q 17. B. Identifying risk
Q 18. B. The risk register documents all the risks in detail
Page 107
Q1. Risk Context in which the Project is operating:
The above mentioned project is operating in various types of risks associated with it. The
main risk related with it is the deliverable issues. It is not ensured that the proposed project will
deliberately meet the deliverable of the project. Thus the risks remains intact with the project.
The first risks related with the project deliverable is that the API compatibility issue. In this case
the newly designed website must be able to run in the API which is pre-existing in the system. If
it fails to compatible with the old API then it will be failed to retrieve the data of the user
generated documents and the official records. Thus the risks of the data loss occurs in this case.
Another, risks related with this project is the privacy and the security related issues. In this case
the data which is captured form the online website should reflect Australian Privacy Policies and
with that it have to also maintain the security obligations. In this case if the project fails to do so
then the administration module support will be loose. Also, it will be failed to encrypt the
important data which includes the personal data of the user, indexes and email ids. From the
public side, login related risks can occur. When the website goes in to maintenance or
Risk Management for Desklib - Study Material Library_4
5RISK MANAGEMENT
redevelopment has been done then it must intact the statistics of the main database. When the
data of the database tampered while maintenance then the problem occurs. In this case the old
users fails to login into the portal. This type of cases is the login related risks.
With the above mentioned main risks the other risks are the hosting related risks.
Hosting of the website needs to be perfect that it is available whenever accessed. If the hosting of
the website goes wrong then it will be unavailable to most of the users. In such cases when the
hosting of the website goes wrong then it fails to archives the infrastructure of the IT. Also, it
fails to meet the data protection control. Also, the aesthetics design of the website should remain
intact. Thus this aspects should be maintained properly as the whole project is running in this
context of the risks.
Q2. Identifying risk tool of the projects:
To identify the risks related with the project various types of tools and techniques
is used in this case. For the first case, various type of document is reviewed. For the document
case, project related document and the organizational process related document is reviewed.
Following that the technique of information gathering is used. Swot analysis is a very good
approach for identifying the risks related with the project which in this case. Risks related with
the project is identified in this case. In the case of tools the probability and matrix tools is used.
In this case the matrix helped to identify the risk which needs immediate responses. The
probability tools is used for determining the chances of occurring the identified risks. Thus the
organization can prepare themselves to mitigate the chances of risks as much as possible.
Risk Management for Desklib - Study Material Library_5
6RISK MANAGEMENT
Page 111 to 113
Q1. The changes that must be implemented in order to make the data base and the
framework of the processor robust, the elements that are present in the course of the 8solution
alignment must comply the projection of the data orientation and this section is initiated by the
Australian government. The data accessibility of the orientation of the statistics orientation
includes the fact that the placement of web content will procure the data processing and this is
will add robustness in the functioning technique of the data base of the business modulation. The
online forms that must be filled in order to register the same in order to stay protected from any
of the issues that the organization might face. This includes the technology that the Australian
government will keep a track on the functioning of the website that is taken under consideration.
The entire processing of the website will portray the reflection of the security issue. This is the
reason that the managing of the task will act transcriptional and this is the lone reason that the
National Privacy principle will not be commenced with the processing of the business
management.
Q2. After implementation of these terminologies, the main prosecution that can be stated
with the functioning of the data management, the main issue that will be presently in the
functioning of the data issues. The main function this website will ensure the fact that the data
orientation of the entire website Destination Australia will be more secured. The main reason of
this security is that the dispensation of the data orientation includes the statistic that the data
placement that is achieved in the functioning of the data base of the Destination data base will
include that the photos that will be archived will get processed and this is the reason that the
project orientation will be affected in a positive way. This is the sole section that the major
instrumentation process will be commenced and this is the reason that the imposters will not dare
Risk Management for Desklib - Study Material Library_6

End of preview

Want to access all the pages? Upload your documents or become a member.