risk 2 Flashcards
Different Risk Management Perspectives
General vis-a-vis specialized risk management
Organization-centric risk management
SE Project Centric risk management
Application-centric risk management
Supply chain risk management
Risk management in emerging technologies
Risk management through IT auditing and checklists.
Business continuity management as a risk management tool.
General vis-a-vis specialized risk management
Risk management is a pervasive activity inherent in all environments.
- General Risk Management covers basic concepts that are sufficiently generic to apply to various contexts ex. ISO31000
- Specialized Risk Management can be seen as extending, or building upon general risk management, and covers specific environments, ex. ISO/IEC27005
Organization Centric Risk Management
Primarily aims to address risks that are pertinent to the organization as a whole. For example, the generation of low quality code might not be a significant risk for the organization but it would have been on a project basis. Wider scope of risk.
SE Project Centric Risk Management
Potential Conflicts between an SE project and the context framing it: Context framing is very important in project centric risk management. It is useful to consider that the interests relating to a SE project may not be aligned with other interests in the organization. If the SE project is too innovative it may have to be shut down, sold to another org etc.
Application-Centric Risk Management
Application centric risks tend to be more technical, such as:
- Insecure coding (new version typically every 3-4 years)
- The use of untrustworthy cloud services
- Application running on unpatched operating systems
- Application running with insecure computer network environments
- Lack of rigor in testing
- Lack of documentation
- Lack of configuration management
Supply Chain Risk Management
Examples of Supply Chain Risk:
- Over or underestimating the need for subcontractors
- The choice of the wrong subcontractor/s due to:
- Lack of competence
- Lack of resources
- The jurisdiction in which they operate
- Exclusion of important clauses from the engagement contract, relating to:
- Data protection
- Confidentiality - NDA
- Right to audit the subcontractor
- Need to have an ISMS in place
Risk Management in Emerging Technologies
Some examples of past emergent technologies include IOT, 3D printing, the internet, quantum computing and low code technology.
There are five attributes that feature in the emergence of a novel technology:
Radical Novelty
Relatively fast growth
Coherence
Prominent Impact
Uncertainty and ambiguity
Radical Novelty
- Fulfilling a given function using a different basic principle to what was used before.
- Publications and patents are limited in assessing radical novelty contemporarily.
- In contrast, news articles etc are valuable sources that provide good insight into whether a technology is viewed as radically novel.
- These documents may also provide a basic understanding of the principles underpinning the examined technology.
Relatively Fast Growth
Especially when compared to non-emergent technologies, relatively fast growth rates. Growth rates may be revealed from the analysis of funding data, big data and altmetrics. Most studies assume rapid growth is an essential condition of emergence.
Coherence
Coherence and its persistence over time distinguish technologies that have acquired a certain identity and momentum and distinguish from those still in a state of flux and thus not yet emerging. It may be detected by examining the scientific discourse around a given emergent technology.
Prominent Impact
Emerging technologies exert a prominent impact on specific domains or more broadly in the socio-economic system. They do so by changing the composition of actors’ institutions, patterns of interactions among those and the associated processes for the production of knowledge.
Uncertainty and Ambiguity
Emerging technologies are characterized by uncertainty in their possible outcomes and uses, both can be utilized to identify and manage SE project risks as the controls used in control-based audits are typically based on past experience, and risk-based audits are based on the risks identified by the auditor.
Risk Management through IT Auditing (and checklists)
Two approaches are used for the performance of IT audits; control-based audits and risk-based audits. Both can be utilized to identify and manage SE project risks because the controls used in control-based audits are typically based on past experience, and risk-based audits are based on the risks identified by the auditor.
Control-Based Audits
These are the characteristics of control-based audits:
- Audit starts with a list of expected controls based on best practice
- The auditor evaluates the controls
- The auditor reports on inadequacies relating to the controls
The controls would be based on existing checklists, standards and guidelines ex. ISO/IEC27001. Therefore, the controls are based on previous experience about the risks faced by organizations. Control based audits are generally considered an outdated approach