StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Risk Assessment and a Risk Management Process - Essay Example

Cite this document
Summary
This essay explores the risk assessment measures that are taken beforehand so that whenever an issue arises the team is prepared to take steps. At the time people don’t know what to do and how to react in terms of emergencies, so if an assessment is done, things can be saved from greater loses…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Risk Assessment and a Risk Management Process
Read Text Preview

Extract of sample "Risk Assessment and a Risk Management Process"

Risk Assessment Risk can be defined as a combination of the probability of occurrence of harm, and the severity of that harm. Risk assessment comes under a risk management process. The risk assessment measures are taken before hand so that whenever an issue arises the team is prepared to take steps. At time people don't know what to do and how to react in terms of emergencies, so if an assessment is done, things can be saved from greater loses. Risk management is helpful in answering questions such as whether failing to upgrade your file-and-print server will affect the ability of users to do their jobs properly; whether implementation of the latest intrusion-detection technology will reduce the likelihood of someone breaking into your e-mail server; and whether a firewall is necessary to protect your Web server, or if simple router ACLs (access control lists) will suffice. Furthermore, a risk-management process will help you prioritize these issues should you lack the resources necessary to address them all immediately. The question that arises is that when should the risk assessment be done. These are a few of the reasons. Prior to work with an agent At regular intervals At least annually Incase of a change Move or renovation New employee Different piece of equipment New technique or procedure 1. Establish the risk assessment team. The team is formed to collect, analyze and report the assessments to the management. It is important that all aspects of the activity work flow be represented on the team, including human resources, administrative processes, automated systems, and physical security. The reason is to plan things before hand so that it becomes easy to go by. The team members on the other hand will have to attend and participate in the meetings, they will have to take the responsibility of achieving goals and objectives. The team members will also have to work hard for effective teamwork and communications, share responsibility for all team decisions and share knowledge and expertise with the team. The team members would themselves have to provide leadership where appropriate and last but not the least, will have to participate in training sessions where required. 2. Set the scope of the project. The assessment team should identify at the outset the objective of the assessment project, department, or functional area to be assessed, the responsibilities of the members of the team, the personnel to be interviewed, the standards to be used, documentation to be reviewed, and operations to be observed. When the scope of a project is discussed, the output is in terms of time and cost. Scope is important because experience team members would know how changes in scope cause an issue. As the things proceed scopes do change, as the team members are not aware of the actual outcomes of things. 3. Identify assets covered by the assessment. Assets may include, but are not limited to, personnel, hardware, software, data (including classification of sensitivity and criticality), facilities, and current controls that safeguard those assets. It is key to identify all assets associated with the assessment project determined in the scope. 4. Categorize potential losses. Identify the losses that could result from any type of damage to an asset. Losses may result from physical damage, denial of service, modification, unauthorized access, or disclosure. Losses may be intangible, such as the loss of the organizations' credibility. It is only after knowing these losses can the team think of threats that may occur. More than one individual gathers the potential loss or anything concerning this. Everyone can give his or her own comments. The more different possibilities are taken out, the more prepared a team becomes incase of an event. 5. Identify threats and vulnerabilities. A threat is an event, process, activity, or action that exploits a vulnerability to attack an asset. Include natural threats, accidental threats, human accidental threats, and human malicious threats. These could include power failure, biological contamination or hazardous chemical spills, acts of nature, or hardware/software failure, data destruction or loss of integrity, sabotage, or theft or vandalism. A vulnerability is a weakness, which a threat will exploit to attack the assets. Vulnerabilities can be identified by addressing the following in your data collection process: physical security, environment, system security, communications security, personnel security, plans, policies, procedures, management, support, etc. It is a fact that one cannot avoid any kind of threat completely. But then again a preparation before hand helps a lot in finding solutions. Numerous types of vulnerabilities, both physical and electronic, are possible. Each should be examined and documented. It doesn't do much good to control all the risks associated with electronic access to your systems if someone could physically touch them and modify or walk away with data. Many tools exist for evaluating electronic vulnerabilities. The primary value of these tools lies in automation and detection; that is, typically they'll scan your systems for configurations and services, compare the results with a database of known exploits, and produce a report. This saves you the laborious task of examining systems manually and researching the latest exploits. It also provides a method of easily obtaining consistent data on your system vulnerabilities. Identify existing controls. Controls are safeguards that reduce the probability that a threat will exploit a vulnerability to successfully attack an asset. Identify those safeguards that are currently implemented, and determine their effectiveness in the context of the current analysis. These controls make us think why risk management is necessary. The reasons are increased certainty and fewer surprises; better service delivery; more effective management of change; more effective management of change; more efficient use of resources; better management at all levels through improved decision making; reduced waste and better value for money; management of contingent and maintenance activities. 6. Analyze the data. In this phase, all the collected information will be used to determine the actual risks to the assets under consideration. A technique to analyze data includes preparing a list of assets and showing corresponding threats, type of loss, and vulnerability. Analysis of this data should include an assessment of the possible frequency of the potential loss. 7. Determine cost-effective safeguards. Include in this assessment the implementation cost of the safeguard, the annual cost to operate the safeguard, and the life cycle of the safeguard. 8. Report. The type of report to make depends on the audience to whom it is submitted. Typically, a simple report that is easy to read, and supported by detailed analysis, is more easily understood by individuals who may not be familiar with your organization. The report should include findings; a list of assets, threats, and vulnerabilities; a risk determination, recommended safeguards, and a cost benefit analysis. One must communicate openly regarding risk management so relevant information about risk is shared. This is important because the mitigation strategy may cause risk in another area of the company. In addition, other risks are often understood by individuals that don't have the resources to deal with them. Communicating actions based on a risk assessment may open new areas for investigation that otherwise would have gone unnoticed. Types of Risk assessment One of the most common risk assessment methodologies employed is adhoc. Over here someone may belief that a risk exists, and the management should do something about it. It is common with small-scale businesses. An analysis of the numerous risk-assessment methodologies is beyond the scope of our discussion, but it's important to note that each methodology has been developed to meet specific needs, each has strengths and weaknesses, and each may or may not apply to a given situation. Conclusion Recollecting all the information gathered we can see that risk assessment plays a very important role. Examples can be taken from those organizations who did not had any risk assessment methodologies planned and at the time of an undesirable event the organization was helpless physically and financially both. All the top organizations are taking risk assessment seriously after disasters like Katrina. Doing the assessment would surely take time but the end results are worth it. References 1. Neville Turbit. Defining Project Scopes in IT Projects. Retrieved November 22nd, 2006, from http://www.projectperfect.com.au/info_define_the_scope.php 2. Conducting a Risk Assessment. Retrieved November 22nd, 2006, from http://www.ehss.vt.edu/Programs/LSD/Biosafety/BiosafetyForLaboratoryWorkers/16_RiskAssessment.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“A review of Risk Assessment Methodologies Essay”, n.d.)
Retrieved from https://studentshare.org/business/1534392-a-review-of-risk-assessment-methodologies
(A Review of Risk Assessment Methodologies Essay)
https://studentshare.org/business/1534392-a-review-of-risk-assessment-methodologies.
“A Review of Risk Assessment Methodologies Essay”, n.d. https://studentshare.org/business/1534392-a-review-of-risk-assessment-methodologies.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risk Assessment and a Risk Management Process

Risk Management

The Five Most Important Principles of risk management Abstract risk management is a field of inquiry that provides assessments to organizations that can help to define how goals and objectives can be achieved.... There are a number of different principles that can be used in order to frame the process of risk management.... The second is through tailoring the risk management to the needs of the organization so that it is relevant....
8 Pages (2000 words) Essay

The Risks of a Nuclear Power Plant Facility

risk management and its Relevance after the Occurrence of a Disaster Because of the potentiality of a risk to produce undesirable and hazardous results, policies and strategies should be put in place to manage them whenever they occur.... This brings in the concept of risk management.... risk management entails a well-structured and organized process of risk identification, and the subsequent measurement of the risk and enactment of systems to handle it....
5 Pages (1250 words) Essay

Baderman Island Resort Risk Assesment

For Baderman, the aim of risk assessment is to analyze possible risks and threats, weaknesses and outcomes of the proposed solutions.... risk assessment will begin with identifying variables relevant to a firm's strategic situation, along with their causal interrelationships.... In risk assessment, Baderman management should take into account that designing an IT strategy requires human, financial, and energy resources.... Contingency plans are preparations to take specific action(s) when an event not planned for in the formal planning process takes place....
3 Pages (750 words) Article

Risk Assessment

After all the assessments have been made, interventions geared towards risk management involve comparative risk analysis, risk reduction and strategy, and financial commitment (Spoolman & Miller, 2011, 428).... Risk assessment is the process of estimating the probability of a risk, comparing it with other risks probability and establishing priorities for avoiding or managing risks.... hellip; According to Spoolman & Miller (2011), a risk is the probability of suffering harm from a hazard that can cause injury, disease, death, economic loss or damage and is usually expressed as a mathematical Risk Assessment The essay aims to address a two-fold objective to wit to differentiate hazard, risk,and outrage; and (2) to give an example of low hazard risk but with a high outrage risk....
2 Pages (500 words) Essay

Risk Assessment and Risk Management

hellip; Risk Assessment is one of the components of the risk management process, which involves risk identification, assessment, and control.... Workers and other company stakeholders have a right to be protected from harm that may occur due to lack of enough control measures; it justifies the need to incorporate risk assessment and risk management models.... The essay "risk assessment and Risk Management" talks about the knowledge bases in risk assessment and risk management and the consensus-based model of risk assessment....
6 Pages (1500 words) Essay

Risk management

risk assessment and management in the networked economy (Illustrated ed.... Quantitative and qualitative approaches to risk assessment and analysis: Why do regulators generally rely on quantitative methods?... In recent times, some scholars have classified risk assessment as a source of competitive risk management risk management Risk assessment is important because it provides organizations with a clear view of the risks posed by current and future processes, investments, or operations....
1 Pages (250 words) Assignment

Private and Public Entity Risk Management

hellip; The proceeding chapter of the paper divulges on the risk management process (risk controls) which begin with risk classification of specific risks in a given environment.... In the paper “Private and Public Entity risk management” the author analyzes the various categories of risk which are: personal risk which impact individuals on a personal level such as life and health issues.... Like many of it is counter-parts the Minnesota state government has largely ignored the vital role played by risk management in achieving both operational and strategic objectives....
5 Pages (1250 words) Essay

Critical Analysis of a Risk Management System

"Critical Analysis of a risk management System" paper conducts an analysis on the nature of a blasting risk management system as featured in the mining industry and thereafter gives recommendations or strategies that can be applied in bettering its effectiveness.... From the analysis, it can be concluded that while several risk management systems exist, their effectiveness differs and that some factors need to be changed or modified in achieving effectiveness....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us