Project Part 1

Topics: Management, Logistics, Risk assessment, Risk, Supply chain management, Qualitative research / Pages: 5 (803 words) / Published: Apr 27th, 2015
Running head: Risk Plan

Defense Logistics Information Systems: Risk Assessment
Byron Davis
IS3110

Defense Logistics Information Systems: Risk Assessment Outline

Introduction 2
Scope 3
Qualitative and Quantitative Risk Assessments 3
Key Departments and Roles 4
Assessment Schedule 5

Introduction
In order to create a safe and healthy workplace many companies create a risk assessment (RA). A risk assessment identifies potential hazardous threats, risk, or vulnerabilities and analyzes them to see what would possibly happen should those threats, risk, or vulnerabilities occur. It is important to remember that a risk assessment isn’t about paperwork but to identify and analyze any possible risks that might affect our agency, Defense Logistic Information Systems (DLIS). In addition to finding all possible risks, threats, and vulnerabilities, we will describe the possible impacts should these risks occur as well as ensure that DLIS being a federal agency complies with NIST and FISMA.
Scope
The RA will be limited to the risks associated to DLIS and affected systems area that will be necessary for it to complete its mission. This RA won’t list operational areas unnecessary for DLIS to achieve its mission. This RA will not include payroll, base security or flight operations.
Qualitative and Quantitative Risk Assessments In planning a risk assessment, it is necessary to be aware of the two types of risk assessments, Qualitative and Quantitative.
Qualitative Assessment is an approach that prioritization risks by priority or impact. It allows for the determination of greater risk in a short time that are more and are the least expensive. However, there are some downsides to a qualitative assessment, as it is completely inefficient when performing a Cost Benefit Analyst (CBA).
Threat
Probability
Impact
Risk = P x I
IT – Hardware Issues
0.8
100
80%
Hurricane
0.2
100
20%
Tornado
0.3
100
30%
Fire – Internal
0.3
100
30%
IT – Operational Error (Human)
0.7
50
35%



References: Kirvan, P. (2008). A free IT risk assessment template. Retrieved from Techtarget: http://searchdisasterrecovery.techtarget.com/Risk-assessments-in-disaster-recovery-planning-A-free-IT-risk-assessment-template-and-guide Kirvan, P. (2008). Getting started with a risk assessment. Retrieved from Techtarget: http://searchdisasterrecovery.techtarget.com/Risk-assessments-in-disaster-recovery-planning-A-free-IT-risk-assessment-template-and-guide Rouse, M. (2005, September). What is A Perimeter Network. Retrieved from TechTarget: http://searchnetworking.techtarget.com/definition/network-perimeter

You May Also Find These Documents Helpful

  • Project Part 1
  • Project Part 1
  • Project Part 1
  • Project part 1
  • Project Part 1
  • Project Part 1
  • Project Part 1
  • Project Part 1 Task 1
  • Project Part 1 Task 1
  • IS3440 project part 1