Risk and Issue Management Report: Detailed Analysis of ICT

Verified

Added on  2023/04/08

|12
|1142
|486
Report
AI Summary
This report provides a comprehensive analysis of risk and issue management, particularly within the context of Information and Communication Technology (ICT) projects. The report begins by defining risk management, presenting a table that details various risks such as physical threats, technical failures, security risks, and human error, along with their mitigation plans, contingency plans, and potential impacts. The report also delves into issue management, presenting a table that outlines current issues, their descriptions, assigned owners, status, priority, and proposed resolutions. Specific issues like phishing, hacking, and operational uncertainty are analyzed, along with the proposed steps to mitigate them. The report references several academic sources to support its findings and conclusions, offering valuable insights into managing risks and issues effectively in ICT environments.
Document Page
Running head: RISK AND ISSUE MANAGEMENT
RISK AND ISSUE MANAGEMENT
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
RISK MANAGEMENT AND ISSUE MANAGEMENT
Table of Contents
Risk Management.......................................................................................................................3
Issue Management......................................................................................................................5
References................................................................................................................................12
Document Page
2
RISK MANAGEMENT AND ISSUE MANAGEMENT
Risk Management
Ris
k
Id.
Risk Description Mitigation Plan
(what to do to
avoid the risk
occurring)
Contingency Plan
(what to do if the
risk occurs)
Impact (what
the impact will
be to the
project if the
risk occurs)
Likelihoo
d of
occurrenc
e (e.g., %,
or high /
medium /
low)
1 Physical threats are
caused by access or
any sort of damage
from various natural
disasters like floods
or earthquake; these
risks can also be
caused due to
mishandling of
workplace resources
by employees.
Every employee
must be provided
with their
passwords without
which they would
not be able to
access their data.
The guilty must be
penalized with
strict actions, and
in case of natural
disasters, the
organization must
have insurance of
the resources
(Hilty&Aebischer2
015).
Data loss
Damage to
resources
Internal risks
like leakage of
personal data of
an organization.
High
2 Technical failure is a
common risk faced
by the ICTs; this risk
occurs when due to
A technician must
be hired to solve
these issues
because the absence
The organizations
must ensure that
no data loss has
taken place and try
Data loss Medium
Document Page
3
RISK MANAGEMENT AND ISSUE MANAGEMENT
any reason, the
technical system
within the
organization fails to
function effectively.
of a technician
might take a long
time for the
organization in
solving these
issues.
to overcome the
issue as soon as
possible.
3 Security risks are
also one of the
common risks faced
by the ICTs where
hackers tend to steal
organizational data.
Security programs
must be
implemented by the
organizations to
prevent these risks.
In case of minor
issues, they must
be avoided and in
case of major
issues, strict
actions must be
undertaken
(Vanderhoven,
Schellens,
Vanderlinde &
Valcke, 2016)
Compromising
of data
Data Breach
Low
4 Human error is an
error that causes
when an employee
accidentally deletes
the data in his
computer or any of
his college's
computer (Hughes,
Backup should be
created by
organizations for
organizational as
well as employee's
data.
The employee
must be penalized
with strict actions
against him.
Loss of data High
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
RISK MANAGEMENT AND ISSUE MANAGEMENT
Bohl, Irfan, Margolese-
Malin & Solórzano,
2017)
Issue Management
I
D
Current
Status
Prior
ity
Issue
Descripti
on
Assig
ned
To
Owne
r
Escal
ation
Requi
red
(Y/N)
?
Impact
Summa
ry
Action
Steps
Issue
Type
Final
Resolution
&
Rationale
1
Open Criti
cal
Phishing
is an
issue that
affects
the
functioni
ng of the
ICT
processin
g
Data
base
mana
ger
Yes The
impact
of this
issue
can be
adverse
in the
comme
ncing
of the
project
(Kabra
&
Rames
Meet
with
the
databas
e
manage
r and
implem
ent the
security
measur
es as
per
discussi
Syste
m
Installing
the anti-
phishing
toolbar
will be
helpful in
this
process.
Blocking
of
websites
that are
not
necessary
Document Page
5
RISK MANAGEMENT AND ISSUE MANAGEMENT
h
2015).
With
the help
inclusio
n of
fake
emails
and
website
s the
imposte
rs can
gain
access
to
persona
l data.
In this
process
the
imposte
rs send
links to
the
on for
completio
n of the
project
will also
act as an
important
issue
mitigation
strategy.
Updating
of the
browsers
regularly
will also
help in
mitigating
this issue.
Document Page
6
RISK MANAGEMENT AND ISSUE MANAGEMENT
genuine
employ
ee, on
clickin
g the
link,
the
users
provide
the
imposte
r's
access
to the
databas
e of the
ICT
platfor
m.
Work In
Progress
High Hacking
of the
project
leads to
unauthori
zed
Data
base
mana
ger
No In case
of
hacking
the
hacker
gets
Meet
with
the
databas
e
manage
Syste
m
Install a
firewall on
the ICT
platform.
With the
help of the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
RISK MANAGEMENT AND ISSUE MANAGEMENT
access to
data by
individua
ls. In this
case
authentic
ation
barrier
that
protects
the data
from
unauthori
zed
access is
exposed
and
alteration
or
stealing
of the
data is
done in
the
platform
into the
databas
e of the
ICT
platfor
m by
crackin
g the
passwo
rd that
is set
(Jorgen
son, D
&
Vu201
6).
After
gaining
access
to the
data
that are
stored
in the
databas
r and
implem
ent the
security
measur
es as
per
discussi
on
implement
ation of
the
firewall
and
setting,
proper
passwords
in this
system
will also
protect the
system
from
getting
attacked
by
hackers.
Proper
updating
of the
software's
is also an
important
step in the
Document Page
8
RISK MANAGEMENT AND ISSUE MANAGEMENT
of the
ICT
e of the
ICT
platfor
m, they
either
alter
the data
or they
block
the
other
users to
gain
access
to the
data.
mitigation
of the
issue.
Closed Med
ium
Uncertai
nty over
Innovatio
n. The
fast rate
of
growth
of
technolo
IT
Mana
ger
Yes In this
case,
the
employ
ee of
the
organiz
ation
that
Meet
with
the
training
and the
researc
h and
develop
ment
Proce
dural
Providing
training to
the
employees
of the
organizati
on are the
most
important
Document Page
9
RISK MANAGEMENT AND ISSUE MANAGEMENT
gy in the
field of
ICT has
been one
of the
major
issues for
the
impleme
ntation of
ICT. The
employee
s present
in the
business
organizat
ion are
not
always
capable
enough
or skilled
enough
to cope
up with
uses the
ICT
platfor
m falls
short of
the
require
d skill
set.
This
leads to
the fact
that the
functio
nal
efficien
cy of
the
platfor
m
decreas
es.
team.
Arrang
e
training
session
for the
employ
ees
strategy
that must
be
implement
ed to
mitigate
the issue
(da Silva,
Fortes &
do
Nasciment
o2017)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
RISK MANAGEMENT AND ISSUE MANAGEMENT
the
regular
upgradati
on of the
platform
of ICT
Document Page
11
RISK MANAGEMENT AND ISSUE MANAGEMENT
References
da Silva, C. J. N., Fortes, D. X., & do Nascimento, R. P. C. (2017). ICT Governance, Risks
and Compliance.
Hilty, L. M., &Aebischer, B. (2015). ICT for sustainability: An emerging research field. In
ICT Innovations for Sustainability(pp. 3-36). Springer, Cham.
Hughes, B. B., Bohl, D., Irfan, M., Margolese-Malin, E., & Solórzano, J. R. (2017).
ICT/Cyber benefits and costs: Reconciling competing perspectives on current and future
balance. Technological Forecasting and Social Change, 115, 117-130.
Jorgenson, D. W., & Vu, K. M. (2016). The ICT revolution, world economic growth, and
policy issues. Telecommunications Policy, 40(5), 383-397.
Kabra, G., & Ramesh, A. (2015). Analyzing ICT issues in humanitarian supply chain
management: A SAP-LAP linkages framework. Global Journal of Flexible Systems
Management, 16(2), 157-171.
Vanderhoven, E., Schellens, T., Vanderlinde, R., & Valcke, M. (2016). Developing
educational materials about risks on social network sites: a design based research
approach. Educational technology research and development, 64(3), 459-480.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]