What is risk - PowerPoint PPT Presentation

1 / 30
About This Presentation
Title:

What is risk

Description:

For each risk, identify how risk is to be identified, managed, monitored, ... Methods for Software Systems Development by Elaine M. Hall, Addison-Wesley 1998 ... – PowerPoint PPT presentation

Number of Views:30
Avg rating:3.0/5.0
Slides: 31
Provided by: rmac2
Category:
Tags: elaine | risk

less

Transcript and Presenter's Notes

Title: What is risk


1
What is risk?
A risk is a possibility of loss.
Undesirable outcome.
Missed opportunity.
2
Anatomy of a risk
Risk
3
The Risk Management Process
Identify risks
Analyze risks
Learn about risks
Risk Knowledge Base
Plan for risks
Resolve risks
Track risks
4
Risk Management Planning
  • For each risk, identify how risk is to be
    identified, managed, monitored, and closed out.
    Consider
  • What is the risk,
  • Where and When might the risk occur,
  • Who is responsible for managing that risk,
  • Why does the risk exist, and
  • How will the risk be handled if it occurs?

5
Risk management strategies (i)
6
Risk management strategies (ii)
7
Risk monitoring
  • Assess each identified risks regularly to decide
    whether or not it is becoming less or more
    probable.
  • Also assess whether the effects of the risk have
    changed.
  • Each key risk should be discussed at management
    progress meetings.

8
Risk indicators
9
Key points
  • Good project management is essential for project
    success.
  • The intangible nature of software causes problems
    for management.
  • Managers have diverse roles but their most
    significant activities are planning, estimating
    and scheduling.
  • Planning and estimating are iterative processes
    which continue throughout the course of a
    project.

10
Key points
  • A project milestone is a predictable state where
    a formal report of progress is presented to
    management.
  • Project scheduling involves preparing various
    graphical representations showing project
    activities, their durations and staffing.
  • Risk management is concerned with identifying
    risks which may affect the project and planning
    to ensure that these risks do not develop into
    major threats.

11
Risk Management Techniques
  • Generic processes
  • Threat trees (see below)
  • Threat analysis
  • Based on fault trees
  • Only addresses the threat identification stage
  • Attack trees (see below)
  • Vulnerability analysis

12
Threat Trees 1
  • ATT Bell Laboratories
  • Categorisation of threats
  • Disclosure / Integrity / Denial of service
  • Categorisation of vulnerabilities by view
  • Personnel view
  • Physical view
  • Operational view
  • Communications view
  • Network view
  • Computing view
  • Information view

13
Threat Trees 2
  • Model of system
  • Calculate risks from
  • Impact
  • Vulnerability

Threats to Electronic Mail
Message Handling M
Originator O
Recipient R
Disclosure
Denial of Service
Integrity
Other Subscribers S
External E
Electronic Mail System
14
Attack Trees
  • Tree Structure
  • Goal is root node
  • Ways of achieving goals are leaf nodes
  • Costs can be associated with nodes
  • Schneier, B, Secrets and Lies. 2000 John Wiley
    and Sons.

15
Why quantify risk
  • Allows solution ideas to be evaluated more
    critically
  • Encourages design awareness of risk
  • Allows feedback on risks we missed
  • Allows feedback on impact of risks we anticipated
  • Allows us to allocate resources to deal with
    risks
  • Allows us to determine whether a risk is
    acceptable

16
Identification Documentation
Adapted from Managing Risk Methods for Software
Systems Development by Elaine M. Hall,
Addison-Wesley 1998
17
Identification Communication
  • Notify all affected stakeholders
  • Customers
  • Project/Program Manager
  • Fellow Team Members
  • Management
  • Marketing
  • Sales
  • Customer Support
  • Finance
  • Quality Assurance
  • SEPG

18
Analysis of risks Questions
  • How severe is the consequence?
  • How likely is the occurrence?
  • Is the risk exposure acceptable?
  • How soon must the risk be dealt with?
  • What is causing the risk?
  • Are there similarities between risks?
  • Are there dependency relationships?
  • What are the risk drivers?

19
Analysis of risks Activities
  • Grouping
  • Eliminate redundant risks Combine related risks
    Link dependent risks
  • Determining risk drivers
  • Underlying factors that affect severity of
    consequence
  • May affect estimation of probability,
    consequence, risk exposure
  • Increases understanding of how risks can be
    mitigated
  • Ranking
  • Order of likelihood, consequence, exposure, time
    frame
  • Determining root causes (sources of risk)
  • Old-fashion root cause analysis,
  • Identify common root causes

20
Analysis Documentation
Adapted from Managing Risk Methods for Software
Systems Development by Elaine M. Hall,
Addison-Wesley 1998
21
Planning Resolution Strategies
  • Risk Avoidance
  • Prevent the risk from occurring, reduce
    probability to zero
  • Risk Protection
  • Reduce the probability and/or consequence of the
    risk before it happens
  • Risk Reduction
  • Reduce the probability and/or consequence of the
    risk after it happens
  • Risk Research
  • Obtain more information to eliminate or reduce
    uncertainty
  • Risk Reserves
  • Use previously allocated schedule or budget slack
  • Risk Transfer
  • Rearrange things to shift risk elsewhere (to
    another group, for example)

22
Planning Activities
  • Specify scenarios
  • How would we be able to tell it is really
    happening?
  • Define quantified threshold for early warning
  • What to monitor, when we consider the risk to be
    happening
  • Develop resolution alternatives
  • Ways to eliminate, mitigate or handle the risk
  • Select resolution approach
  • What has the best ROI?
  • Specify risk action plan
  • Document decisions

23
Planning/Tracking Documentation
Adapted from Managing Risk Methods for Software
Systems Development by Elaine M. Hall,
Addison-Wesley 1998
24
Tracking
  • Monitor risk scenarios
  • Watch for signs of a risk scenario occurring
  • Compare indicators to trigger conditions
  • Watch indicator metrics do they satisfy trigger
    conditions?
  • Notify stakeholders
  • Let stakeholders know the risk is happening
    execute action plan
  • Collect statistics
  • Update risk database

25
Resolution
  • Acknowledge receipt of notification
  • Let stakeholders know you are on the ball
  • Indicate response time
  • Determine accountability/ownership
  • Execute action plan
  • Improvise, adapt, overcome
  • Wanted common sense
  • Provide continuous updates
  • Let stakeholders know your progress in resolving
    the risk
  • Collect statistics
  • Update risk database

26
Resolution Documentation
Adapted from Managing Risk Methods for Software
Systems Development by Elaine M. Hall,
Addison-Wesley 1998
27
Risk Management Capability
5 Risk statistics used to make
organizational/process improvements
4 Quantified analysis used to determine
resolution cost/benefit for project
3 Risks systematically quantified, analyzed,
planned, tracked and resolved
2 Risks are usually recorded, tracked and
handled as they are discovered
1 Risks ignored or only tracked in an ad-hoc
fashion
28
Evolutionary Delivery
Requirements Capture
Design/Select Architecture
High-level evolutionary plan
Select and plannext step
micro-projects
Execute planned step
Deliver to real users
Evaluate feedback
29
Learning from risks
  • Post mortem
  • What were the unanticipated risks?
  • What was the actual severity of consequence?
  • What resolution strategies worked well/not so
    well?
  • What types of risks could we
  • prevent or transfer?
  • protect ourselves from or reduce?
  • handle only by allocating reserves?
  • Action
  • What are the preventative measures we can take in
    the future?
  • What can the SEPG do?
  • Are there significant vendor/partner performance
    problems?
  • What can we share with other project teams?

30
Risk Management Infrastructure
CommonRisksChecklists
StandardRiskTemplate
RiskDatabase WithStatistics
RiskRankingTemplate
RiskMgt. PlanTemplate
Write a Comment
User Comments (0)
About PowerShow.com