BSBPMG517: In-Depth Analysis & Management of Project Risks

Verified

Added on  2023/06/04

|25
|3011
|197
Report
AI Summary
This report provides a detailed analysis of project risk management, focusing on the identification, assessment, and mitigation of risks within a project context. It addresses key areas such as risk assessment processes, risk registers, and risk action plans, referencing specific pages and questions from the assignment brief (BSBPMG517). The report explores various risk categories, including deliverable issues like API compatibility, privacy and security concerns, login-related risks, and hosting-related risks. Tools and techniques for risk identification, such as SWOT analysis and probability matrices, are discussed. Furthermore, the report delves into implementing changes for robust data management and the impact of these changes on data security and project performance. Mitigation strategies, lessons learned, and a comprehensive risk register are included, providing a thorough overview of risk management practices and their application to project success. Desklib provides a platform for students to access this and other solved assignments.
Document Page
Running Head: RISK MANAGEMENT
Risk Management
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2RISK MANAGEMENT
Table of Contents
Page 96 to 99.......................................................................................................................3
Page 107...............................................................................................................................4
Page 111 to 113...................................................................................................................5
Risk Register........................................................................................................................9
Risk Action Plan................................................................................................................21
Risk Action Plan 1.........................................................................................................21
Risk Action Plan 2.........................................................................................................21
Risk Action Plan 3.........................................................................................................22
Risk Action Plan 4.........................................................................................................22
Reference...........................................................................................................................24
Document Page
3RISK MANAGEMENT
Page 96 to 99
Q1. Risk assessment entail
Risk entail helps us in calculating the risks that are present and might affect. Risk entail
also proves the processing off the data orientation system. The module members of the developer
performs the prosecution of the Australian Privacy Principles. The security operation is
performed with the assistance of the data orientation and this is the main reason that the
implementation of the business coordination will be performed in a better way. This is the main
reason that the processing of the tracking of the data will be managed with high security.
Q2. A. Risk Register
Q3. D. Magnitude and Probability
Q4. B. Resources aligned to handling the risk
Q5. C. Weaknesses
Q6. A. Probability Impact Matrix
Q7. B. SWOT Analysis
Q8. E. System failure models
Q9. C. Execution
Q10. A. Perform Quality Risk Analysis
Q11. A. Perform Qualitative Risk analysis
Q12. A. Exploit
Document Page
4RISK MANAGEMENT
Q13. C. Risk Mitigation
Q 14. B. Interview
Q15. D. Mitigate
Q16. B. Mitigate
Q 17. B. Identifying risk
Q 18. B. The risk register documents all the risks in detail
Page 107
Q1. Risk Context in which the Project is operating:
The above mentioned project is operating in various types of risks associated with it. The
main risk related with it is the deliverable issues. It is not ensured that the proposed project will
deliberately meet the deliverable of the project. Thus the risks remains intact with the project.
The first risks related with the project deliverable is that the API compatibility issue. In this case
the newly designed website must be able to run in the API which is pre-existing in the system. If
it fails to compatible with the old API then it will be failed to retrieve the data of the user
generated documents and the official records. Thus the risks of the data loss occurs in this case.
Another, risks related with this project is the privacy and the security related issues. In this case
the data which is captured form the online website should reflect Australian Privacy Policies and
with that it have to also maintain the security obligations. In this case if the project fails to do so
then the administration module support will be loose. Also, it will be failed to encrypt the
important data which includes the personal data of the user, indexes and email ids. From the
public side, login related risks can occur. When the website goes in to maintenance or
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5RISK MANAGEMENT
redevelopment has been done then it must intact the statistics of the main database. When the
data of the database tampered while maintenance then the problem occurs. In this case the old
users fails to login into the portal. This type of cases is the login related risks.
With the above mentioned main risks the other risks are the hosting related risks.
Hosting of the website needs to be perfect that it is available whenever accessed. If the hosting of
the website goes wrong then it will be unavailable to most of the users. In such cases when the
hosting of the website goes wrong then it fails to archives the infrastructure of the IT. Also, it
fails to meet the data protection control. Also, the aesthetics design of the website should remain
intact. Thus this aspects should be maintained properly as the whole project is running in this
context of the risks.
Q2. Identifying risk tool of the projects:
To identify the risks related with the project various types of tools and techniques
is used in this case. For the first case, various type of document is reviewed. For the document
case, project related document and the organizational process related document is reviewed.
Following that the technique of information gathering is used. Swot analysis is a very good
approach for identifying the risks related with the project which in this case. Risks related with
the project is identified in this case. In the case of tools the probability and matrix tools is used.
In this case the matrix helped to identify the risk which needs immediate responses. The
probability tools is used for determining the chances of occurring the identified risks. Thus the
organization can prepare themselves to mitigate the chances of risks as much as possible.
Document Page
6RISK MANAGEMENT
Page 111 to 113
Q1. The changes that must be implemented in order to make the data base and the
framework of the processor robust, the elements that are present in the course of the 8solution
alignment must comply the projection of the data orientation and this section is initiated by the
Australian government. The data accessibility of the orientation of the statistics orientation
includes the fact that the placement of web content will procure the data processing and this is
will add robustness in the functioning technique of the data base of the business modulation. The
online forms that must be filled in order to register the same in order to stay protected from any
of the issues that the organization might face. This includes the technology that the Australian
government will keep a track on the functioning of the website that is taken under consideration.
The entire processing of the website will portray the reflection of the security issue. This is the
reason that the managing of the task will act transcriptional and this is the lone reason that the
National Privacy principle will not be commenced with the processing of the business
management.
Q2. After implementation of these terminologies, the main prosecution that can be stated
with the functioning of the data management, the main issue that will be presently in the
functioning of the data issues. The main function this website will ensure the fact that the data
orientation of the entire website Destination Australia will be more secured. The main reason of
this security is that the dispensation of the data orientation includes the statistic that the data
placement that is achieved in the functioning of the data base of the Destination data base will
include that the photos that will be archived will get processed and this is the reason that the
project orientation will be affected in a positive way. This is the sole section that the major
instrumentation process will be commenced and this is the reason that the imposters will not dare
Document Page
7RISK MANAGEMENT
to get into the data base of the website and perform criminal activities. In case the registration of
the website would not been performed, it would have been easier for the imposters to again
admittance to the photos that are present in the data base of the organization. This is the main
reason that the orientation of the entre process was Tran scripted with the help of the business
processing scheme. Implementing this recommendation includes the fact that the business
orientation of the Destination website has gained robustness and this also helps in aiming better
audience base, which helps in better processing of the data base. This indicates to the fact that
the data base that is present in the system will be completely protected in the dispensation of the
data that are deposited in the data base will be safe and secured.
Q1. Project performance in terms of risk orientation has been high and this is the reason
that the data that is preset in the course of the technology will be acting beneficial as the
methodology that is implemented in this project orientation will be in process as the data
orientation that is performed in the business orientation will procure the data commencement of
the business organization. The main aspect that is taken into consideration includes the fact that
the risk assessment plan will also increase the brand loyalty of the organization and this is the
reason that the functioning of the Destination Australia. This incurs the fact that the data
proclamation will get informed regarding the data base robustness. The security of the
informations that is deposited in the data base includes the fact that the processing of the faith on
the website increases. This increase in faith of the global audience also allows the better
functioning of the business orientation and this is the reason that the processing off the data
orientation will be performed with ease. In case the data that is processed with the help of the
data orientation is removed, the progression in the website diversity increases and this is the
reason that the functionality process increases its efficiency. This proves the fact that the risk
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8RISK MANAGEMENT
assessment presentation has been acting as a substitute as one of the major reason for the
completion of the data management. This is the key motive that the handing out of the
infrastructure orientation will be performed with utmost efficiency
Q2.
Date Description of the
problem
Recommendation of
risk mitigation
Lessons learned
03. 10. 2018 The main problem
that is present in the
course of the
Destination Website
is that the photos that
are stored in the data
base of the website
must get validated
and the
personification of the
photo privacy might
get hampered. This is
the main reason that
the processing of the
data orientation will
be performed keeping
the security of the
Implementation of
firewall might act as
one of the major
mitigation technique.
This leads to the fact
that the data that are
stored in the data
base of the website
will be protected
Security can be a
major issue in the
course pf completion
of the business
management
Document Page
9RISK MANAGEMENT
website
3. 10. 18 The photos that are
present in the website
might get lost as the
photos are stored in
the data base of the
orientation sector as
the data base of the
website might get
unstructured. In that
case the data that are
stored in the data
bade will get deleted.
This leads to the fact
that the photos that
are to be archived,
might affect the
processing of the data
prosecution of the
users of the website
Implementation of a
structured data base
might act helpful in
this case
Photos might get lost
despite the fact that
updated technologies
are used.
Risk Register
Risk
Numb
Risk Risk
descriptio
Likeliho Impa Rati Mitigati
on
Likeliho Impa Rati
Document Page
10RISK MANAGEMENT
er Category n
including
existing
risk
control
od ct ng strategy
/
Respon
se
od ct ng
01 Photo
privacy
In this
case the
risk that is
present in
the course
of the
photo
prosecutio
n is that
the access
of
personnel’
s that are
not
permitted.
In this
case the
photos
High High 9 Usage
of
Antivir
us and
barriers
High High 4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11RISK MANAGEMENT
that are
stored are
stored in
digital
platform.
This
storage of
the photos
will get
affected as
the data
terminolo
gy that is
stored in
the data
base of the
organizati
on can be
accessed
through.
In case an
imposter
gains
Document Page
12RISK MANAGEMENT
access to
the data
that are
stored in
the data
base of the
organizati
on can
gain hold
of the
photos
that are
stored in
the data
base and
alter the
same. This
will affect
the
presentatio
n of the
data
procureme
chevron_up_icon
1 out of 25
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]