Risk Assessment
Marissa Hornbuckle
July 24, 2014
Table of Contents
Risk Assessment Matrix – Addendum 3
Risk Assessment Matrix 3
Risk Metrics 6
Current Project Status 7
General 7
Current 8
Package 1 – Computer Inventory and requirements 8
Package 2 – Technical Support 8
Package 3 – Computing Support 8
Package 4 – Document Servers 8
Package 5 – Shared Drives 8
Package 6 – FTP Sites 8
Package 7 – Firewalls 8
Package 8 – Web-based meetings 9
Hours Report 9
Problem Analysis 10
Over hardware budget 10
Over labor budget 10
Backordered Computers 11
Additional Recommendations 11
Executive Summary 13
Risk Assessment Matrix – Addendum
Risk Assessment Matrix
Description of Risks
Impact
Likelihood of Occurrence (L,M,H)
Degree of Impact (L,M,H)
Initial Action to Take if Event Occurs
Team Member Responsible
Strategies for Prevention and Mitigation
Mobile device access to company network
Hacker access to company network via Bluetooth/wireless networks, open access to send/give company information
L
H
Complete a thorough analysis of the mobile device policies. Periodically examine mobile device usage and identify security risks/threat.
Valene/
Clemencia
Develop mobile device policies/procedure. Implement security safeguards based on policies/procedure documents. Make sure network is designed with mobile devices in mind.
Full system failure
A computer that has full system failure, not allowing the technical support team to reach the computer remotely to provide technical support.
This will cause a delay in project completion. It will take several days or weeks to reinstate an employee’s computer.
M
H
In the event of full system failure, the computer will have to be returned to the company so that the technical team can assess the cause of full system failure, make the necessary upgrade/replacements
Hugh
Indicators of IT assets need to be determined and taken into account for the life expectancy of the equipment being used by