Risk Analysis in IT
Risk Analysis in IT
Risk Analysis in IT
Phase 1—Initiation The need for an IT system is • Identified risks are used to
expressed and the purpose and support the development of the
scope of the IT system is system requirements.
Documented
Phase 2—Development or The IT system is designed, • The risks identified during this
Acquisition purchased, programmed, phase can be used to support
developed, or otherwise the security analyses of the IT
Constructed System.
Phase 3—Implementation The system security features • The risk management process
should be configured, enabled, supports the assessment of the
tested, and verified system implementation against
its requirements.
Phase 4—Operation or The system performs its • Risk management activities are
Maintenance functions. performed for periodic system
Reauthorization.
Phase 5—Disposal This phase may involve the • Risk management activities
disposition of information, are performed for system
hardware, and software. Components.
Project Risk Management
Processes
Risk identification: determining which risks are likely to affect a
project and documenting the characteristics of each.
Contd.
Qualitative Risk Analysis
Probabilistic Analysis specifies a probability distribution for each risk and then
considers the effect of risks in combination. This is perhaps the most common
method of performing a quantitative risk analysis.
Influence Diagrams are a relatively new technique for risk analysis. They provide
a powerful means of constructing models of the issues in a project which are subject
to risk .
Decision Trees are another graphical method of structuring models. They bring
together the information needed to make project decisions and show the present
possible courses of action and all future possible outcomes.
Risk Mitigation
Risk mitigation, involves prioritizing, evaluating, and
implementing the appropriate risk-reducing controls
recommended from the risk assessment
process.
These changes mean that new risks will surface and risks previously
mitigated may again become a concern. Thus, there is a need for an
ongoing risk evaluation and assessment.
Management