Final Exam Technology in Project Management
Final Exam Technology in Project Management
1. Risk Management Prepare a risk management plan for a logistics management development project for Gateway Logistics. Use the risk assessment report outline below. a. Introduction b. System Characterization Characterize the system hardware, software, system interfaces, data and users. Provide connectivity diagram of flowchart to delineate the scope of the risk assessment activity. c. Threat Statement d. Risk Assessment Results Provide list of observations (vulnerability/ threat pair). Each observation must include: o Discussion of threat-source and vulnerability pair. o Identification of existing mitigating security controls o Likelihood discussion and evaluation o Impact analysis discussion and evaluation o Risk rating o Recommended controls or alternative options e. Summary
they
The End-Users: Responsible in performing the company distribution of goods. They are the first person encountered the risk of the company. Risk assessment techniques used: At this assessment we used some data gathering to get the result of this risk problem to this company.
Risk Description & Necessary Actions The loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets or individuals. The loss of confidentiality, integrity, or availability could be expected to have a serious adverse effect on organizational operations, organizational assets or individuals.
Modera te
The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect on organizational operations, organizational assets or individuals. II. System characterization Hardware Server: Windows Server 2003 Router: D-Link Software OS: Windows 7 Other Application: Office 2010 System Interfaces Back-End: DB2 Front-End: VB.net
Low
Flowchart
III. Threat statement List of the potential Threat-sources and associated threat action applicable to the system:
Lack of visibility into sub-tier suppliers Companies typically rely on tier 1 suppliers to manage sub-tier suppliers. To assess the wider impact of the disasters, they're now striving to gain better visibility into the ramifications on their sub-tier suppliers. Some companies urged their contract manufacturers and tier 1 suppliers to contact their suppliers to try and assess the situation. But in general, this has been viewed as an effort-intensive step, requiring direct conversations and email exchanges. There doesnt appear to be any systematic approach to enabling this multi-tier visibility.
Access to up-to-date, accurate intelligence With competing intelligence sources and expert opinions, companies are struggling to identify reliable sources of information and are relying on public sources. The companies indicated they rely on their logistics providers for accurate assessments of the local impact.
Lack of radiation expertise Radiation will potentially affect their inbound and outbound transportation, as well as their product and component safety and it might cause broader environmental risk exposure. As the current crisis begins to move toward normality, its time to re-evaluate the layout of your supply network design to make it more resilient to future catastrophes. This may include designing products that allow more flexibility in supply and manufacturing, increasing long-term alternative sources of raw
materials and logistics capability and expanding outsourced manufacturing capacity. It is also a prime opportunity to push for a more robust and funded risk management capability. Will help your organization sense and respond to issues as early as possible, minimizing the impact on your end customers. IV. Risk Assessment Results
o Discussion of threat-source and vulnerability pair.
Analysis consists of the integration of inventory, facility location, transportation, packaging activities and informational flow for the purpose of managing an effective physical flow of outbound and inbound goods and services in a competitive environment. The complete cost and system approach are developed for planning and managing the various logistical functions that are prevalent within the organization. It may be dependent on the techniques of basic sampling and data analysis. This may involve the use of questionnaires and online or electronic ways of gathering information. It is based on an in-hand application of several analytical tools that are beneficial in the field of logistics analysis. Also, examination of several features of the logistical system and the development of skills helpful in analyzing numerous technical logistical issues.
The complete process of optimization of plans and procedures paves the way for creating an everlasting and sustainable competitive advantage for the organization throughout a supply chain despite the risks associated so commonly with unbounded challenges. There is a need for the integration of business processes of the organization with its technological systems for the purpose of enhancing speed, organizational responsiveness and flexibility in the networks of customers and suppliers. analysis involves the use of numerous quantitative techniques, strategic and tactical planning on the part of the organization while still giving importance to the sphere of operational research. It involves logistical aspects such as network design, forecasting, inventory control and warehousing. The purpose of the investigation is planning and managing of the modeling and simulation analysis efforts to measure the logistics impact of the changes proposed by logistics management to procedures and techniques as a prototype mechanism. Identification of Vulnerabilities Vulnerabilities were identified by: The End-User
Identification of Threats Threats were identified by: The Management and Technical Personnel
Identification of Risks Risks were identified by: Risk Management Team The way vulnerabilities combine with credible threats to create risks is identified Table D.
Table D: Vulnerabilities, Threats, and Risks Risk No. Vulnerability Lack of visibility into sub-tier suppliers 1 Threat wider impact of the disasters Risk of Compromise of Risk Summary
The complete cost Lack of visibility and system into sub-tier approach are suppliers developed for planning and managing the various logistical functions that are prevalent within the organization The companies indicated they rely on their logistics providers for accurate assessments of the local impact. Access to up-todate, accurate intelligence
Will help your Lack of radiation organization expertise sense and respond to issues as early as possible, minimizing the impact on your end customers
Table H: Risk Likelihood Ratings Risk No. 1 2 3 Risk Summary Lack of visibility into sub-tier suppliers Access to up-to-date, accurate intelligence Lack of radiation expertise Risk Likelihood Evaluation The End-User The Technical Personnel The Management Risk Likelihood Rating Low Moderate High
Moderate Low
Table J documents the results of the impact analysis, including the estimated impact for each risk identified in Table D and the impact rating assigned to the risk.
Table J: Risk Impact Analysis Risk No. 1 Risk Summary Lack of visibility into sub-tier suppliers Risk Impact There doesnt appear to be any systematic approach to enabling this multi-tier visibility The companies indicated they rely on their logistics providers for accurate assessments of the local impact it might cause broader environmental risk exposure. Risk Impact Rating Low
Moderate
High
Risk rating
Low Low Low 10 x 0.1 = 1 50 x 0.1 = 5 100 x 0.1 = 10 Risk Scale: Low (1 to 10); Moderate (>10 to 50); High (>50 to 100)
Table L assigns an overall risk rating, as defined in Table K, to each of the risks documented in Table D.
Table L: Overall Risk Ratings Table Risk No. 1 Risk Summary Lack of visibility into sub-tier suppliers Risk Likelihood Rating Low Risk Impact Rating Low Overall Risk Rating Low
Risk No. 2 3
Moderate
High
V. Summary At this study the management found out the three (3) Finding of observation according to the research has been taken and the no. 1 is Lack of visibility into sub-tier suppliers, no. Access to up-to-date, accurate intelligence, no. 3Lack of radiation expertise. Included in the table M. the recommendation should the company compliant this to the success of the company.