Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Discuss about the case study of BSBPMG517 Manage Project Risk.

Risk Context in which the Project is operating.

Risk Context in which the Project is operating

Risk entail helps us in calculating the risks that are present and might affect. Risk entail also proves the processing off the data orientation system. The module members of the developer performs the prosecution of the Australian Privacy Principles. The security operation is performed with the assistance of the data orientation and this is the main reason that the implementation of the business coordination will be performed in a better way. This is the main reason that the processing of the tracking of the data will be managed with high security.

Q1. Risk Context in which the Project is operating:

The above mentioned project is operating in various types of risks associated with it. The main risk related with it is the deliverable issues. It is not ensured that the proposed project will deliberately meet the deliverable of the project. Thus the risks remains intact with the project. The first risks related with the project deliverable is that the API compatibility issue. In this case the newly designed website must be able to run in the API which is pre-existing in the system. If it fails to compatible with the old API then it will be failed to retrieve the data of the user generated documents and the official records. Thus the risks of the data loss occurs in this case. Another, risks related with this project is the privacy and the security related issues. In this case the data which is captured form the online website should reflect Australian Privacy Policies and with that it have to also maintain the security obligations. In this case if the project fails to do so then the administration module support will be loose. Also, it will be failed to encrypt the important data which includes the personal data of the user, indexes and email ids. From the public side, login related risks can occur. When the website goes in to maintenance or redevelopment has been done then it must intact the statistics of the main database. When the data of the database tampered while maintenance then the problem occurs. In this case the old users fails to login into the portal. This type of cases is the login related risks.

With the above mentioned main risks the other risks are the hosting related risks. Hosting of the website needs to be perfect that it is available whenever accessed. If the hosting of the website goes wrong then it will be unavailable to most of the users. In such cases when the hosting of the website goes wrong then it fails to archives the infrastructure of the IT. Also, it fails to meet the data protection control. Also, the aesthetics design of the website should remain intact. Thus this aspects should be maintained properly as the whole project is running in this context of the risks.

Identifying risk tool of the projects

Q2. Identifying risk tool of the projects:

To identify the risks related with the project various types of tools and techniques is used in this case. For the first case, various type of document is reviewed. For the document case, project related document and the organizational process related document is reviewed. Following that the technique of information gathering is used. Swot analysis is a very good approach for identifying the risks related with the project which in this case. Risks related with the project is identified in this case. In the case of tools the probability and matrix tools is used. In this case the matrix helped to identify the risk which needs immediate responses. The probability tools is used for determining the chances of occurring the identified risks. Thus the organization can prepare themselves to mitigate the chances of risks as much as possible.

Q1. The changes that must be implemented in order to make the data base and the framework of the processor robust, the elements that are present in the course of the 8solution alignment must comply the projection of the data orientation and this section is initiated by the Australian government. The data accessibility of the orientation of the statistics orientation includes the fact that the placement of web content will procure the data processing and this is will add robustness in the functioning technique of the data base of the business modulation. The online forms that must be filled in order to register the same in order to stay protected from any of the issues that the organization might face. This includes the technology that the Australian government will keep a track on the functioning of the website that is taken under consideration. The entire processing of the website will portray the reflection of the security issue. This is the reason that the managing of the task will act transcriptional and this is the lone reason that the National Privacy principle will not be commenced with the processing of the business management.

Q2. After implementation of these terminologies, the main prosecution that can be stated with the functioning of the data management, the main issue that will be presently in the functioning of the data issues. The main function this website will ensure the fact that the data orientation of the entire website Destination Australia will be more secured. The main reason of this security is that the dispensation of the data orientation includes the statistic that the data placement that is achieved in the functioning of the data base of the Destination data base will include that the photos that will be archived will get processed and this is the reason that the project orientation will be affected in a positive way. This is the sole section that the major instrumentation process will be commenced and this is the reason that the imposters will not dare to get into the data base of the website and perform criminal activities. In case the registration of the website would not been performed, it would have been easier for the imposters to again admittance to the photos that are present in the data base of the organization. This is the main reason that the orientation of the entre process was Tran scripted with the help of the business processing scheme. Implementing this recommendation includes the fact that the business orientation of the Destination website has gained robustness and this also helps in aiming better audience base, which helps in better processing of the data base. This indicates to the fact that the data base that is present in the system will be completely protected in the dispensation of the data that are deposited in the data base will be safe and secured.

Changes that must be implemented for a robust database and framework

Q1. Project performance in terms of risk orientation has been high and this is the reason that the data that is preset in the course of the technology will be acting beneficial as the methodology that is implemented in this project orientation will be in process as the data orientation that is performed in the business orientation will procure the data commencement of the business organization. The main aspect that is taken into consideration includes the fact that the risk assessment plan will also increase the brand loyalty of the organization and this is the reason that the functioning of the Destination Australia. This incurs the fact that the data proclamation will get informed regarding the data base robustness. The security of the informations that is deposited in the data base includes the fact that the processing of the faith on the website increases. This increase in faith of the global audience also allows the better functioning of the business orientation and this is the reason that the processing off the data orientation will be performed with ease. In case the data that is processed with the help of the data orientation is removed, the progression in the website diversity increases and this is the reason that the functionality process increases its efficiency. This proves the fact that the risk assessment presentation has been acting as a substitute as one of the major reason for the completion of the data management. This is the key motive that the handing out of the infrastructure orientation will be performed with utmost efficiency

Q2.

Date

Description of the problem

Recommendation of risk mitigation

Lessons learned

03. 10. 2018

The main problem that is present in the course of the Destination Website is that the photos that are stored in the data base of the website must get validated and the personification of the photo privacy might get hampered. This is the main reason that the processing of the data orientation will be performed keeping the security of the website

Implementation of firewall might act as one of the major mitigation technique. This leads to the fact that the data that are stored in the data base of the website will be protected

Security can be a major issue in the course pf completion of the business management

3. 10. 18

The photos that are present in the website might get lost as the photos are stored in the data base of the orientation sector as the data base of the website might get unstructured. In that case the data that are stored in the data bade will get deleted. This leads to the fact that the photos that are to be archived, might affect the processing of the data prosecution of the users of the website

Implementation of a structured data base might act helpful in this case

Photos might get lost despite the fact that updated technologies are used.

Risk Number

Risk Category

Risk description including existing risk control

Likelihood

Impact

Rating

Mitigation strategy/ Response

Likelihood

Impact

Rating

01

Photo privacy

In this case the risk that is present in the course of the photo prosecution is that the access of personnel’s that are not permitted. In this case the photos that are stored are stored in digital platform. This storage of the photos will get affected as the data terminology that is stored in the data base of the organization can be accessed through. In case an imposter gains access to the data that are stored in the data base of the organization can gain hold of the photos that are stored in the data base and alter the same. This will affect the presentation of the data procurement. This is the main reason that the projection of the photo commencing is considered as one of the most important aspect of data center.   

High

High

9

Usage of Antivirus and barriers

High

High

4

02

Storage of the photos

The data that are stored in the data base of the organization might get erased due to excess load during the time of transcription this leads to the fact that the data terminology will get immensely effected. In case the photos that are stored in the data base will be portrayed as the projection of the data managements system. The aspect that is taken into consideration is that the data base that are automated in nature generally follow the First In First Out terminology. This in turn will project the termination of the project association and this might act as the reason for the processing of the data management system. In that case the photos that aware initially stored in the data base will get deleted

High

Low

6

Keeping backup of the data

High

High

7

03

Photo arrangement

The arrangement of the stored photo also acts as one of the main problems that are present in the course of the data maintenance system. This is also responsible for the processing of the data proclamation. In case the photos that are stored in the data base. This is the main reason that the data management system can be performed with the help of the unstructured management. In case the management is performed in an unstructured manner. In case  the structuring of the data that are being processed will be terminated and accessing of the data might be a problem

High

Low

8

Structured storage of the data

Low

Low

8

04

Photo pinning

Photo pinning is considered to be the highest risk among the other 3. This is due to the fact that the projection of the photos are related to the projection of man management  and this is the main reason that the deletion of the photos takes place

High

High

4

Proper pinning of the photos

Low

High

7

Risk Action Plan 1

Proposed Actions: Usage of Antivirus and barriers

Resource Requirement: Antivirus system

Responsibility: Protecting the photos from different imposters

Scope Impact: High

Time Impact: Low

Cost Impact: Low

Reporting and Monitoring required: Yes

Prepared by

Date

Reviewed by

Date

Please Fill

Please Fill

Please Fill

Please Fill


Risk Action Plan 2

Proposed Actions: Keeping backup of the data

Resource Requirement: Paragon Backup & Recovery

Responsibility: keeping the data stored in a separate place

Scope Impact: High

Time Impact: Low

Cost Impact: Low

Reporting and Monitoring required: Yes

Prepared by

Date

Reviewed by

Date

Please Fill

Please Fill

Please Fill

Please Fill


Risk Action Plan 3

Proposed Actions: Structured storage of the data

Resource Requirement:  CSZ CMS

Responsibility: keeping the data structured

Scope Impact: Low

Time Impact: High

Cost Impact: Low

Reporting and Monitoring required: Yes

Prepared by

Date

Reviewed by

Date

Please Fill

Please Fill

Please Fill

Please Fill

Proposed Actions: Proper pinning of the photos

Resource Requirement: ACDsee 20

Responsibility: Storing of the photos

Scope Impact: High

Time Impact: Low

Cost Impact: High

Reporting and Monitoring required: Yes

Prepared by

Date

Reviewed by

Date

Please Fill

Please Fill

Please Fill

Please Fill

Reference

Bessis, J., 2015. Risk orientation in banking. John Wiley & Sons.

Brustbauer, J., 2016. Enterprise risk orientation in SMEs: Towards a structural model. International Small Business Journal, 34(1), pp.70-85.

Burtonshaw-Gunn, S.A., 2017. Risk and financial orientation in construction. Routledge.

Glendon, A.I. and Clarke, S., 2015. Human safety and risk management: A psychological perspective. Crc Press.

Haimes, Y.Y., 2015. Risk modeling, assessment, and management. John Wiley & Sons.

Hillson, D. and Murray-Webster, R., 2017. Understanding and managing risk attitude. Routledge.

Hopkin, P., 2018. Fundamentals of risk management: understanding, evaluating and implementing effective risk management. Kogan Page Publishers.

Lam, J., 2014. Enterprise risk management: from incentives to controls. John Wiley & Sons.

McNeil, A.J., Frey, R. and Embrechts, P., 2015. Quantitative Risk Management: Concepts, Techniques and Tools-revised edition. Princeton university press.

Olson, D.L. and Wu, D.D., 2015. Enterprise risk management(Vol. 3). World Scientific Publishing Company.

Pritchard, C.L. and PMP, P.R., 2014. Risk management: concepts and guidance. Auerbach Publications.

Reason, J., 2016. Managing the risks of organizational accidents. Routledge.

Renz, D.O., 2016. The Jossey-Bass handbook of nonprofit leadership and management. John Wiley & Sons.

Sadgrove, K., 2016. The complete guide to business risk management. Routledge.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Risk Context And Identifying Risk Tools For Project Management Essay.. Retrieved from https://myassignmenthelp.com/free-samples/bsbpmg517-manage-project-risk.

"Risk Context And Identifying Risk Tools For Project Management Essay.." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/bsbpmg517-manage-project-risk.

My Assignment Help (2019) Risk Context And Identifying Risk Tools For Project Management Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/bsbpmg517-manage-project-risk
[Accessed 22 June 2024].

My Assignment Help. 'Risk Context And Identifying Risk Tools For Project Management Essay.' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/bsbpmg517-manage-project-risk> accessed 22 June 2024.

My Assignment Help. Risk Context And Identifying Risk Tools For Project Management Essay. [Internet]. My Assignment Help. 2019 [cited 22 June 2024]. Available from: https://myassignmenthelp.com/free-samples/bsbpmg517-manage-project-risk.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close