SlideShare a Scribd company logo
1 of 26
Risk-based Software Planning
What is a Risk?
[object Object],[object Object],[object Object],[object Object]
Where Can Risks Arise From?
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object]
What Are the Levels of Risk predictability?
[object Object],[object Object],[object Object]
How Can Risks Be Identified?
[object Object],[object Object]
[object Object],[object Object],[object Object]
3.5 1.0 3 0 0 1 5 5 2 1.0 1.0 4 1.5 1.5 6 3.5 3.5 7 3.5 1.0 5 7.5 7.5 8 8.0 8.0 12 9.0 9.0 13 10.0 10.0 14 0.5 0 0.5 0 7.5 6.0 11 0.5 0.5 0.5 2.0 1.0 4.0 0.5 1.0 1.0 A project network for the payroll project. Time expressed in weeks, the critical path is highlighted in dark Events 1-2  File design (analyst) 2-3  File creation (programmer) 2-4  Design data entry program (analyst) 3-7  Dummy 4-5  Write data entry program (programmer) 4-6  Design payroll reports (analyst) 5-7  Dummy 6-7  Design payroll program (analyst) 7-8  Write payroll program (programmer) 7-9  Design personnel  program (analyst) 8-12  Write check writer program (programmer) 7.0 5.5 10 6.0 4.5 9 1.0 0.5
What Is Risk Management?
[object Object],Risk Management Risk Assessment Risk Control Risk Identification Risk Analysis Risk Prioritization Risk Mgt Planning Risk Resolution Risk Monitoring Boehm’s  Risk Model Probability and  Estimation Compare Identified Risks Identify All Possible Risks Develop Plans  to Mitigate Risks Employ the Right People,  Develop Prototypes and  Simulations Provides  Assurance
What Is the Relation Between Software Complexity and Risk?
Software  Complexity Risk ,[object Object],[object Object]
What Are Some Risk Management Tools?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A B OR A B AND The failure of either of the events (A and B) causes the top event (or system) to fail The failure of both of the events (A and B) causes the top event (or system) to fail
Source: weilbull.com
[object Object],[object Object],[object Object],[object Object],Hazard Probability Consequence
Consequence Probability Insignificant (1) Minor (2) Moderate (3) Major (4) Extreme (5) Rare (1) Low Low Low Low Low Unlikely (2) Low Low Low Medium Medium Possible (3) Low Low Medium Medium Medium Likely (4) Low Medium Medium High High Almost Certain (5) Low Medium Medium High Extreme
References
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You for Listening  Feel free to send any comments or suggestions Presentation by: Muhammad Alhalaby Email: muhammad.alhalaby@gmail.com

More Related Content

What's hot

Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementPriyanka Aash
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNorth Texas Chapter of the ISSA
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Priyanka Aash
 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingKnoldus Inc.
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceZaiffiEhsan
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020Anton Chuvakin
 
Threat Modeling Web Applications
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web ApplicationsNadia BENCHIKHA
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCPriyanka Aash
 
Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseInfocyte
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue TeamEC-Council
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Santiago Bassett
 

What's hot (20)

Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Secure Software Design for Data Privacy
Secure Software Design for Data PrivacySecure Software Design for Data Privacy
Secure Software Design for Data Privacy
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Unlock Security Insight from Machine Data
Unlock Security Insight from Machine DataUnlock Security Insight from Machine Data
Unlock Security Insight from Machine Data
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat Modelling
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020
 
Threat Modeling Web Applications
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web Applications
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident Response
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue Team
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
 

Similar to Risk-based Software Planning Techniques

Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)Priya Tomar
 
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptxRethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptxInflectra
 
Project risk management
Project risk managementProject risk management
Project risk managementHaseeb Khan
 
Defect effort prediction models in software
Defect effort prediction models in softwareDefect effort prediction models in software
Defect effort prediction models in softwareIAEME Publication
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptxKamranKhan353531
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementNimat Khattak
 
Software Project Management
Software Project ManagementSoftware Project Management
Software Project ManagementNoorHameed6
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projectsiaemedu
 
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next LevelTaking Open Source Security to the Next Level
Taking Open Source Security to the Next LevelWhiteSource
 
Software project planning and monitoring
Software project planning and monitoringSoftware project planning and monitoring
Software project planning and monitoringYb Yar
 
1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docxfelicidaddinwoodie
 
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...ijcsit
 
Implementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationImplementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationSonata Software
 

Similar to Risk-based Software Planning Techniques (20)

Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Ijetcas14 370
Ijetcas14 370Ijetcas14 370
Ijetcas14 370
 
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptxRethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptx
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Defect effort prediction models in software
Defect effort prediction models in softwareDefect effort prediction models in software
Defect effort prediction models in software
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptx
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
Guide to Software Estimation
Guide to Software EstimationGuide to Software Estimation
Guide to Software Estimation
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Software Project Management
Software Project ManagementSoftware Project Management
Software Project Management
 
Risk management
Risk managementRisk management
Risk management
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
 
Software developer
Software developerSoftware developer
Software developer
 
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next LevelTaking Open Source Security to the Next Level
Taking Open Source Security to the Next Level
 
Software project planning and monitoring
Software project planning and monitoringSoftware project planning and monitoring
Software project planning and monitoring
 
1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx
 
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
 
Implementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationImplementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost Optimization
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 

Risk-based Software Planning Techniques

  • 2. What is a Risk?
  • 3.
  • 4. Where Can Risks Arise From?
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. What Are the Levels of Risk predictability?
  • 10.
  • 11. How Can Risks Be Identified?
  • 12.
  • 13.
  • 14. 3.5 1.0 3 0 0 1 5 5 2 1.0 1.0 4 1.5 1.5 6 3.5 3.5 7 3.5 1.0 5 7.5 7.5 8 8.0 8.0 12 9.0 9.0 13 10.0 10.0 14 0.5 0 0.5 0 7.5 6.0 11 0.5 0.5 0.5 2.0 1.0 4.0 0.5 1.0 1.0 A project network for the payroll project. Time expressed in weeks, the critical path is highlighted in dark Events 1-2 File design (analyst) 2-3 File creation (programmer) 2-4 Design data entry program (analyst) 3-7 Dummy 4-5 Write data entry program (programmer) 4-6 Design payroll reports (analyst) 5-7 Dummy 6-7 Design payroll program (analyst) 7-8 Write payroll program (programmer) 7-9 Design personnel program (analyst) 8-12 Write check writer program (programmer) 7.0 5.5 10 6.0 4.5 9 1.0 0.5
  • 15. What Is Risk Management?
  • 16.
  • 17. What Is the Relation Between Software Complexity and Risk?
  • 18.
  • 19. What Are Some Risk Management Tools?
  • 20.
  • 22.
  • 23. Consequence Probability Insignificant (1) Minor (2) Moderate (3) Major (4) Extreme (5) Rare (1) Low Low Low Low Low Unlikely (2) Low Low Low Medium Medium Possible (3) Low Low Medium Medium Medium Likely (4) Low Medium Medium High High Almost Certain (5) Low Medium Medium High Extreme
  • 25.
  • 26. Thank You for Listening Feel free to send any comments or suggestions Presentation by: Muhammad Alhalaby Email: muhammad.alhalaby@gmail.com