Conduct a risk assessment for the business area

Assignment Help Management Information Sys
Reference no: EM131702189

Course Outcome

Apply lessons learned from real-world situations to present day business-continuity planning/disaster-recovery planning (BCP/DRP)

Assess risk to the continuity of business processes

Analyze "what-if scenarios

Describe Continuity of Operations Planning

Describe risk and analyze risk strategies

Assignment Instructions

This is the first individual assignment that will start to inform your phased group activity. Using the business scenario information provided by your instructor, you will identify and prioritize four critical business processes for each business area and perform a risk assessment following the Risk Assessment Form provided by the instructor and as identified by further research.

1. Your business areas should be well defined and appropriate to the case studies. The four critical processes per business area should be clearly explained and correctly relates to the case study.

2. You should conduct a risk assessment for the business area and four critical processes, ensuring that these are well defined and appropriate to the case study.

3. The risk assessment categories (columns) should be complete and measures clearly defined.

4. The mitigation strategy, additional measures, and contingency plan for the risk should be well defined and mapped to the business area and four critical processes.

Additional Guidance for Completing the Spreadsheet:

What is a business area in this scenario?

As discussed in the scenario which is one of the attachments for this assignment, there are several business areas noted: Accounting, marketing, human Resources, and payroll. You are to list these (and you can use your own names or labels), then identify four critical business processes for each area. For example:

Accounting:

• Creating billing invoices

• Management company financial assets

• Producing financial reports

• Collecting customer payments

After laying out those 4 processes (these are just examples), you will then work through the matrix. Without this, it is hard to just take a generalized business area and provide mitigation steps.

So, on your risk assessment spreadsheet, please ensure that you state the business areas and then provide 4 processes for each of these areas. You will then assess the risk for each of the four processes as you traverse across the matrix.

Probability of Occurrence:

Very Likely: 91-100%
Likely to occur: 61-90%
May occur about half of the time: 41-60%
Unlikely: 11-40%
Very unlikely to occur: 0-10%

Impact Intensity:

The impact intensity of the risk can be categorized as High, Medium and Low depending on how critical the risk and its effects can be.

Existing Measures:

The policies, procedures, and resources which are already available to prevent or reduce the impact of the risk.

Mitigation Strategies:

After analyzing all the aspects of the risks and the existing preventive measures that can be used, the project team needs to decide on the mitigation strategy to deal with the risk. There can be four different mitigation strategies. Please note that various risk management guides will provide other flavors of mitigation strategies, but for purposes of this assignment, let's go with the following:

Risk Avoidance:

Risk avoidance is the opposite of risk acceptance. It is the action that avoids any exposure to the risk whatsoever. Risk avoidance is usually the most expensive of all risk mitigation options.

Risk Transference:

Risk transference is the involvement of handing risk off to a willing third party. For example, numerous companies outsource certain operations such as customer service, payroll services, etc. This can be beneficial for a company if a transferred risk is not a core competency of that company. It can also be used so a company can focus more on their core competencies.

Risk Limitation:

Risk limitation is the most common risk management strategy used by businesses. This strategy limits a company's exposure by taking some action. It is a strategy employing a bit of risk acceptance along with a bit of risk avoidance or an average of both. An example of risk limitation would be a company accepting that a disk drive may fail and avoiding a long period of failure by having backups.

Risk Acceptance:

Risk acceptance does not reduce any effects, however, it is still considered a strategy. This strategy is a common option when the cost of other risk management options such as avoidance or limitation may outweigh the cost of the risk itself.

A company that doesn't want to spend a lot of money on avoiding risks that do not have a high possibility of occurring will use the risk acceptance strategy. Mitigation strategies taken from:

Additional Measures:

This field needs to be filled in only for those risks for which control mitigation strategies are decided.

Contingency Plan:

A contingency plan can also be added for high impact risks with a high probability of occurrence, just in case the basic measures fail to perform.

Attachment:- Project Scenario.rar

Reference no: EM131702189

Questions Cloud

Discuss the most viable way to address after effects of peak : As we reach a possible peak in oil production, what alternatives are forming? Consider the role of OPEC, perhaps, in reorganizing and monitoring oil production
Post to the relevant ledger accounts : Its capital cost was $25,000 and accumulated depreciation was $13,000 at date of sale. Post to the relevant ledger accounts
What are tesla resources and capabilities : What are Tesla's resources and capabilities. Comment on its strategic management style and corporate strategy?
Aspects of personality and self-concept : You will consider how these aspects of your personality and self-concept will allow you to improve your skills in a future leadership role.
Conduct a risk assessment for the business area : Conduct a risk assessment for the business area and four critical processes, ensuring that these are well defined and appropriate to the case study.
Research georgia advance directive law : Research Georgia' advance directive law. Describe the law in your words and describe the functions of the form.
What is the amount of interest the mcauliffe corp : What is the amount of interest the McAuliffe corp will record on July 2 2015, the first semiannual interest payment date
Dunkin donut-growth feeds a sweet tooth : Discussion: What does a Porter's Five Forces analysis reveal about the industry in which Dunkin' Donuts and Starbuck's complete?
Describe factors and circumstances about global water cycle : The global water cycle provides renewable water, but a number of factors affect how much freshwater is available for human consumption

Reviews

Write a Review

Management Information Sys Questions & Answers

  Fraud and risk factors and enterprise systems

Review the Fraud Risk Factors on page 288 of the textbook. Choose one (1) factor which you believe is the most important. Justify your response. Next, choose one (1) factor and determine two (2) policies that a company could put in place in order ..

  Build-to-stock to a build-to-ordercompare and contrast both

build-to-stock to a build-to-ordercompare and contrast both the build-to-stock to a build-to-order supply chain models.

  The objectives of creating information security policies

Describe the overall objectives of creating information security policy for this institution.

  Find and describe at least three technological components

Assignment: Integration of Technology- Find and describe at least three technological components that are required for data-driven decision making.

  Determine the value of ea to an enterprise

Why is it important to understand the "people side" of Enterprise Architecture? How does the "people side" determine the value of EA to an enterprise?

  Minis sales department use crm technologyhow can minis

minis sales department use crm technologyhow can minis sales department use crm technology to improve the

  Importance of balancing security and business functionality

Discuss in your own words the importance of balancing security and business functionality. Determine why upper management buy-in for a security program is essential for the program's success and compliance of end users.

  Identify a wireless technology of your choice

Prepare a 500 to 700-word Microsoft Word document. The requirements for this assignment are to: Identify a wireless technology of your choice and Provide a summary of the wireless technology that you chose

  It governance - a hands on approach is the best way

IT Governance - A Hands on Approach is the best way-Prepare a 4- 5-minute one-point argumentative speech present. ation on a topic related to the IT profession or of interest to IT Professionals

  How do each actually determine usage

NTFS "disk quotas" and FSRM quotas are implemented and function differently. In your own words, what are the differences between NTFS disk quotas and FSRM quotas? How do each actually determine usage? Why might an organization choose to use one..

  Analyze and evaluate interface design models

Despite being a fairly old technology, menu-driven interfaces are very common in user interface design. Menu-driven interfaces consist of a series of screens which are navigated by choosing options from lists.

  Briefly explain the steps in business process engineering

Steps found in business process engineering - Briefly explain the steps in business process engineering and Identify one step that you think can be altered and describe how you would change it.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd