Retrieved from https://studentshare.org/information-technology/1437045-week
https://studentshare.org/information-technology/1437045-week.
The risks that pose a threat due to some physical or structural flaw or damage are relatively easier to mitigate and eliminate as their causes are easily found. But certain risks are faced on routine basis and people become so used to them that after a while these risks stop being taken as a threat. Also certain risk handling situation depend upon the person facing the risk his decision at that moment. Certain risks are ignored or overlooked more commonly than others. At the time of meeting the user requirements are misunderstood by the developer due to certain barriers of communication which can result in an inadequate software requirement because client wasn’t able to convey his requirements properly and the developer worked on them thinking that these requirements were what the client wanted.
Also no proper identification of key components so that they are developed as separate parts and merged as units to form a complete software. This technique is helpful in many ways. A follow up with client is necessary to mitigate this threat and using the key components identification technique developer can easily identify which software component deviates from requirements. Inefficient coding is also a issue that the software functions correctly but its speed\performance to calculate or perform operation it was designed for is slow.
While coding it should be made clear by the project manager to programmers that code is optimized for eg a small chunk of inefficient code doesn’t show lack of performance but when hundreds of thousands of such lines of code accumulate the result is under performing software. One of the Major and most commonly overlooked software risk is the security risk. While developing a software for a company the security controls implemented are quite vulnerable. These vulnerability as often not noticed and employees can freely access data and information of other departments or tamper the information as well.
This is a major risk which is overlooked quite a lot of time causing major losses. To reduce this risk and chances of such misuse Controlled access should be given to employees and hierarchy of access should be formed. Some other risks that are overlooked include softwares which are developed on one platform or system function incorrectly on some other platforms or systems. This is due to hardcoded development specific system types which is good for systems with similar configuration as it will perform up to the mark on them but for systems with different configuration it’ll be a hindrance.
Writing a Flexible code so that changes can be accumulated if such situation is faced will be helpful. Also when developing a software it should be kept in mind that technology is making advancement at an exponential pace and users are also shifting to newer technology. So keeping this fact in mind the software be flexible to accommodate upgrades. DQ2-Risk management failure Why do companies fail at risk management? In responding to the question, draw from your own experiences, the text, the topic notes, the additional readings, and/or any additional sources that you research and cite.
The main reason for companies failing at risk management is the lack of contingency planning, training of employees and no proper company document or policy detailing a line of action if certain risk is identified. The requirement for risk management becomes higher for those companies where continuous running of operation
...Download file to see next pages Read More