Preview

risk assessment individual week 2 3

Good Essays
Open Document
Open Document
574 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
risk assessment individual week 2 3
Risk Information Sheet
Risk id:1
Risk name: Downtime that Stevens company don’t expect may extend
Date: January 11, 2015
Probability: 65%
Impact: High
Description:
The time period that the company expects for the migration of data may extend unexpectedly thus increasing the downtime of data thus affecting its availability (Racherla, et al., 2010).
Refinement/Context:
Data migration tools may not be as effective and fast.
Power outages without backup plans in mind

Mitigation/Monitoring:
Adoption of multicore computer architecture and virtualization to reduce the maintenance window

Management/Contingency plan:
Have backup plans in case of power outages
Quality personnel with expertise in both SQL server and oracle.

Current Status:
In process
Originator:
Tamesha Timberlake

Risk Information Sheet
Risk id:2
Risk name: Budget Overrun
Date: January 11, 2014
Probability: 39%
Impact: Moderate
Description:
The amount the company uses in this exercise overruns the budget that the company expects for this process.
Refinement/context:
Re-purchasing of tools
Expenses that are initially not seen or unlikely to occur

Mitigation/Monitoring:
There is need to ensure that all expenses are on initially budget before the exercise starts
Monitor all the tools for faulty before starting any migration

Management/Contingency plan:
Continuous monitoring of migration tools
Thorough planning prior to migration

Current Status:
In process
Originator:
Tamesha Timberlake

Risk Information Sheet
Risk id:3
Risk name: Consumer or Brand Impact
Date: January 11, 2015
Probability: 25%
Impact: moderate
Description:
Data migration involves customer business data such that any loss to this data or its unavailability makes severe negative public relation impact.
Refinement/context:
Interruption and loss of customer/consumer data

Mitigation/Monitoring:
Make sure data migration is transparent by having distributed databases

Management/Contingency plan:
Inform the consumers and clients on the



References: Racherla, S., Bajaj, V., Knebel, E., Korn, G., Kutepova, A., Newell, G., et al. (2010). IBM Information Infrastructure Solutions Handbook. IBM Redbooks, 2010, from www.books.google.com Rozanski, N., & Woods, E. (2011). Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives. Addison-Wesley, 2011, from www.books.googlr.com

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Compute the risk score for each of these individuals using both theMissouri and Washington Risk Assessment models.…

    • 415 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    This company needs to look at for the future, for data loss prevention to be effective, the company must decide on the right strategy, employ the right people, target the right data and purchase the right technology. With these accommodations this should reduce the likelihood and cost of future data, breaches and or violating compliance, rules and laws and or regulations. This will also allow the company to have control over how and what data is being exported and what employees or students are online and how this data is used throughout this company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Pm 586 Week 4 Essay

    • 415 Words
    • 2 Pages

    The total budget for the project is $2,634,172. This amount is about $100,000 less than the current allotted amount of $2,750,000, showing that the project is currently within budget.…

    • 415 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To provide quality training for the new audit compliance system there will be necessary expenditures. This memo will present the final budget proposal these expenditures include but are not limited to: wages, materials, travel expenses, and training materials. Steps have been put in place to minimize the overall cost of the training but not at the cost of quality of the project.…

    • 471 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Laudon, J. P., & Laudon, K. C. (2011). Essentials of management information systems (9th ed.).…

    • 1010 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Tacoma Washington is a port city with an estimated population of 207, 9488. It lies on the Puget Sound, 32 miles southwest of Seattle and 31 miles northeast of the capital city Olympia (https://en.wikipedia.org/wiki/Tacoma,_Washington). The median age of it’s citizens is 35.7 years old (http://www.areavibes.com/tacoma-wa/demographics/). It is estimated that 23% of residents are younger than age 18; 10.9% are between 18 and 24; 29.6% between 25 to 44; 25.3% beteen 45 to 64; and 11.3% are 65 years of age or older. The estimated median household income for its citizens is $52,437 (http://www.city-data.com/city/Tacoma-Washington.html).…

    • 1345 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    In this paper I have just been hired as an Information Security Engineer for a video game development company. I have previously identified all of the potential Threats, Vulnerabilities and Malicious Attacks for the videogame development company. The CIO have reviewed my report and has now requested that I draft a report analyzing and assessing any potential Malicious Attacks, Vulnerabilities and Threats that may be carried out against the company’s network. I will then choose a strategy for dealing with risk, such as mitigation, assignment, risk and avoidance. Next I will develop controls that will be used to mitigate each risk.…

    • 1574 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Disaster Plan

    • 1319 Words
    • 6 Pages

    My name is Emanuel and I am an IT/network consultant, I was hired The IST Department of XYZ Computers to create a disaster plan for the company. Now, the average person would think is there hurricane, title wave, or a tornado about to hit the company; if so why in the heck would the company need an informational technology/networking consultant to create a disaster plan. Well lucky for me it is not that type of disaster, however in the world of informational technology and networking computer viruses, worms, and sometimes natural disasters needs plan just like real disasters. That is why I am going to show you informational technology/networking and computer enthusiast the best way to plan for a disaster for your small/large business, and save your company thousands and possibly millions of dollars lost revenues, user salaries, and server outage costs in server downtime.…

    • 1319 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    bis234

    • 2387 Words
    • 10 Pages

    Rainer, R. K., Jr., & Turban, E. (2009). Introduction to information systems (2nd ed.). Hoboken, NJ: John Wiley & Sons.…

    • 2387 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    During the past decades, health awareness has been rising tremendously in every part of the world. In our daily life, weight control and eating a balanced diet are everywhere in the media. We also constantly read articles in the news that feature a new technology that can improve one’s health in some way. This phenomenon has changed our society and created a sensation that we have never seen before. There are also a lot of people, especially women, who are supporters of an anti-aging lifestyle. Most of us wonder how old we are in biological terms. The RealAge Test was created by Dr. Roizen and Dr. Oz and it has been around since 1999. It is a health measurement of how old one’s body is based on categories like general health, fitness level, emotional state of mind, and diet habits.…

    • 1326 Words
    • 4 Pages
    Better Essays
  • Good Essays

    How did the companies described in this case solve their data quality problems? What management, organization, and technology issues had to be addressed?…

    • 985 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    This problem concerns the problem 1. For more details see last paragraph of Budget process.…

    • 279 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Abstract This article presents a model for describing the architecture of software-intensive systems, based on the use of multiple, concurrent views. This use of multiple views allows to address separately the concerns of the various ‘stakeholders’ of the architecture: end-user, developers, systems engineers, project managers, etc., and to handle separately the functional and non functional requirements. Each of the five views is described, together with a notation to capture it. The views are designed using an architecture-centered, scenariodriven, iterative development process. Keywords: software architecture, view, object-oriented design, software development process…

    • 6006 Words
    • 25 Pages
    Powerful Essays
  • Satisfactory Essays

    Data Migration

    • 24842 Words
    • 100 Pages

    Department of Education Office of Federal Student Aid Data Migration Roadmap: A Best Practice Summary Version 1.0 Final Draft…

    • 24842 Words
    • 100 Pages
    Satisfactory Essays
  • Better Essays

    Software architecture is defined as the structured process providing a solution that meets technical and operational requirements of a project while optimizing performance and security. Architecture provides a set of abstract patterns guiding the design of a software system. This provides for problem-solving and planning to a software solution. Once the purpose and specifications of the proposed software is determined the next step is to design a plan for the solution. Design Patterns allows designers to reuse the fundamental concepts of methodologies employed from previous solutions to complete a current project. These patterns provide a template on how to solve a problem in various situations.…

    • 820 Words
    • 4 Pages
    Better Essays