SlideShare a Scribd company logo
1 of 17
Download to read offline
Software Risk Analysis &
Management
• Risk analysis and management are a series of steps that help us software team to
understand and manage uncertainty.
• Risk is a potential problem-it might happen , it might not. But regardless of the
outcome it's really good to identify it, access its probability of occurrence, estimate its
impact, establish a contingency plan.
• Risk Is defined as an exposure to the chance of injury or loss. Risk implies that there is
a possibility that something negative may happen. In the content of software projects,
negative implies that there is an adverse effect on cost, quality or schedule.
Software Risk Analysis &
Management
Risk Management
• Risk management is the area the tries to ensure that the impact of risk on cost, quality
cost and schedule is minimum.
• Management is a scientific process based on the application of game theory, decision
theory, probability theory and utility theory.
Software Risk Analysis &
Management
Risk Management
• The software engineering institute (SEI) classifies the risk hierarchy as given below:
Software Risk Analysis &
Management
Risk Management
• Risk scenarios may emerge out of management challenges and technical challenges in
achieving specific goals and objectives.
• Risk management must be performed regularly throughout the achievement life cycle.
• Risk are dynamic, they change overtime.
Software Risk Analysis &
Management
Risk Management
• Risk management plays an important role in ensuring that the software product is error
free.
• firstly risk management takes care that the risk is avoided, and if it is not avoidable,
then the risk is detected, controlled and finally recover.
Software Risk Analysis &
Management
Risk Management Categories
1. Risk avoidance
• Risk anticipation
• risk tools
2. Risk detection
• risk analysis
• risk category
• risk prioritization
3. Risk control
• risk pending
• risk resolution
• risk not solvable
4. Risk recovery
• Full
• partial
• extra / alternate feature
Software Risk Analysis &
Management
1. Risk avoidance
• risk anticipation
• Various risk anticipation rules are listed according to standards from previous projects, experience
and also as mentioned by the project manager.
• risk tools
• risk tools are used to test whether the software is risk free. The tools have built in data base of
available risk areas and can be updated depending upon the type of project
Software Risk Analysis &
Management
2. Risk Detection
• risk analysis
• The risk is analysed with previous hardware and software parameters as probabilistic occurrence
(pr),weight factor (wf),risk exposure(pr*wf).
• A Risk table is maintained . maximum value of risk exposure indicates that the problem has to be
solved as soon as possible and be given high priority
Software Risk Analysis &
Management
2. Risk Detection
• risk category
• risk identification can we from various factors like person involved in the team,
management issues, customer specification and feedback, environment, commercial,
technology , etc. Once proper category is identified priority is given depending upon the
urgency of the product.
• risk prioritization
• Depending upon the entries of the risk analysis table , the maximum risk exposure is
given high priority and has to be solved first.
Software Risk Analysis &
Management
3. Risk Control
• risk pending
• According to priority, low priority risk are pushed at the end of the queue with the view
of resources and in case it takes more time their priority is made higher.
• risk resolution
• risk manager makes us strong resolve how to solve the risk.
• risk elimination
• This action leads to serious errors in software
Software Risk Analysis &
Management
3. Risk Control
• risk not solvable
• If a risk takes more times and more resources, then it is dealt in its totality in the
business experts of the organization and thereby it is notified to the customer , and then
the team member proposes an alternate solution . there is a slight variation in the
customer specification after consultation.
Software Risk Analysis &
Management
4. Risk Recovery
• Full
• The risk analysis table is scanned and if the risk is fully solved then the corresponding
entry is deleted from the table
• Partial
• the risk analysis table is scanned and due to the partially solved risks the entries in the
table are updated and thereby the priorities are also updated.
• Extra/ Alternate feature
• Sometimes it is difficult to remove some risk and in that case we can add a new extra
feature which solve the problem and this is later documented or notified to the
customer.
Software Risk Analysis &
Management
sources of risk
1. generic risk
• these are risks, which are common to all software products. for example , requirement
misunderstanding, allowing insufficient time for testing. etc.
2. project specific risk
• A vendor may be promising to deliver particular software by a particular date but he is unable
to do it.
Software Risk Analysis &
Management
Types of risk
1. product risk
2. business risk
3. project risk
Software Risk Analysis &
Management
1. product risk
• These are risk which affect the quality of performance of the software being developed. this
originates from the conditions such as unstable requirement specification , not being able to
meet the design specification affecting software performance and earn certain test
specifications.
Software Risk Analysis &
Management
2. Business risk
• These are risk which affect the Organization developing or producing the software.
• Some of the business risks are:
❑ Building an excellent product or system that no one really wants (market risk)
❑ building a product that no longer fits into the overall business strategy for the company (strategic
risk)
❑ The Sales force don't understand how to sell
❑ losing the support of senior management due to change in focus or change in people (management
risk )
❑ losing budgetary or personal commitment (budget risk)
Software Risk Analysis &
Management
3. project risk
• These are risk which affect the Project schedule or resources. these risk occurs due to
conditions and constraint about resources, relationship with vendors and contractors,
unreliable vendors and lack of organizational support. Funding is the significant project risk
the management has to face. it occurs due to initial budgeting constraint and unreliable
customer payments.

More Related Content

Similar to Risk Analysis.pdf

Similar to Risk Analysis.pdf (20)

crisc_wk_3.pptx
crisc_wk_3.pptxcrisc_wk_3.pptx
crisc_wk_3.pptx
 
Critical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_enCritical role of_risk_assessment_in_international_projects_en
Critical role of_risk_assessment_in_international_projects_en
 
Project risk analysis
Project risk analysisProject risk analysis
Project risk analysis
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk Management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk management lec. 06
Risk management lec. 06Risk management lec. 06
Risk management lec. 06
 
Risk management
Risk managementRisk management
Risk management
 
6.RISK MANAGEMENT.pptx
6.RISK MANAGEMENT.pptx6.RISK MANAGEMENT.pptx
6.RISK MANAGEMENT.pptx
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
 
Session 18 4th edition PMP
Session 18 4th edition PMPSession 18 4th edition PMP
Session 18 4th edition PMP
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
 
Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Session 18 -2 PMP 4th edition
Session 18 -2  PMP 4th editionSession 18 -2  PMP 4th edition
Session 18 -2 PMP 4th edition
 
R I S K M A N A G E M E N T
R I S K  M A N A G E M E N TR I S K  M A N A G E M E N T
R I S K M A N A G E M E N T
 
Risk management
Risk managementRisk management
Risk management
 
Project risk management
Project risk managementProject risk management
Project risk management
 

Recently uploaded

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

Risk Analysis.pdf

  • 1. Software Risk Analysis & Management • Risk analysis and management are a series of steps that help us software team to understand and manage uncertainty. • Risk is a potential problem-it might happen , it might not. But regardless of the outcome it's really good to identify it, access its probability of occurrence, estimate its impact, establish a contingency plan. • Risk Is defined as an exposure to the chance of injury or loss. Risk implies that there is a possibility that something negative may happen. In the content of software projects, negative implies that there is an adverse effect on cost, quality or schedule.
  • 2. Software Risk Analysis & Management Risk Management • Risk management is the area the tries to ensure that the impact of risk on cost, quality cost and schedule is minimum. • Management is a scientific process based on the application of game theory, decision theory, probability theory and utility theory.
  • 3. Software Risk Analysis & Management Risk Management • The software engineering institute (SEI) classifies the risk hierarchy as given below:
  • 4. Software Risk Analysis & Management Risk Management • Risk scenarios may emerge out of management challenges and technical challenges in achieving specific goals and objectives. • Risk management must be performed regularly throughout the achievement life cycle. • Risk are dynamic, they change overtime.
  • 5. Software Risk Analysis & Management Risk Management • Risk management plays an important role in ensuring that the software product is error free. • firstly risk management takes care that the risk is avoided, and if it is not avoidable, then the risk is detected, controlled and finally recover.
  • 6. Software Risk Analysis & Management Risk Management Categories 1. Risk avoidance • Risk anticipation • risk tools 2. Risk detection • risk analysis • risk category • risk prioritization 3. Risk control • risk pending • risk resolution • risk not solvable 4. Risk recovery • Full • partial • extra / alternate feature
  • 7. Software Risk Analysis & Management 1. Risk avoidance • risk anticipation • Various risk anticipation rules are listed according to standards from previous projects, experience and also as mentioned by the project manager. • risk tools • risk tools are used to test whether the software is risk free. The tools have built in data base of available risk areas and can be updated depending upon the type of project
  • 8. Software Risk Analysis & Management 2. Risk Detection • risk analysis • The risk is analysed with previous hardware and software parameters as probabilistic occurrence (pr),weight factor (wf),risk exposure(pr*wf). • A Risk table is maintained . maximum value of risk exposure indicates that the problem has to be solved as soon as possible and be given high priority
  • 9. Software Risk Analysis & Management 2. Risk Detection • risk category • risk identification can we from various factors like person involved in the team, management issues, customer specification and feedback, environment, commercial, technology , etc. Once proper category is identified priority is given depending upon the urgency of the product. • risk prioritization • Depending upon the entries of the risk analysis table , the maximum risk exposure is given high priority and has to be solved first.
  • 10. Software Risk Analysis & Management 3. Risk Control • risk pending • According to priority, low priority risk are pushed at the end of the queue with the view of resources and in case it takes more time their priority is made higher. • risk resolution • risk manager makes us strong resolve how to solve the risk. • risk elimination • This action leads to serious errors in software
  • 11. Software Risk Analysis & Management 3. Risk Control • risk not solvable • If a risk takes more times and more resources, then it is dealt in its totality in the business experts of the organization and thereby it is notified to the customer , and then the team member proposes an alternate solution . there is a slight variation in the customer specification after consultation.
  • 12. Software Risk Analysis & Management 4. Risk Recovery • Full • The risk analysis table is scanned and if the risk is fully solved then the corresponding entry is deleted from the table • Partial • the risk analysis table is scanned and due to the partially solved risks the entries in the table are updated and thereby the priorities are also updated. • Extra/ Alternate feature • Sometimes it is difficult to remove some risk and in that case we can add a new extra feature which solve the problem and this is later documented or notified to the customer.
  • 13. Software Risk Analysis & Management sources of risk 1. generic risk • these are risks, which are common to all software products. for example , requirement misunderstanding, allowing insufficient time for testing. etc. 2. project specific risk • A vendor may be promising to deliver particular software by a particular date but he is unable to do it.
  • 14. Software Risk Analysis & Management Types of risk 1. product risk 2. business risk 3. project risk
  • 15. Software Risk Analysis & Management 1. product risk • These are risk which affect the quality of performance of the software being developed. this originates from the conditions such as unstable requirement specification , not being able to meet the design specification affecting software performance and earn certain test specifications.
  • 16. Software Risk Analysis & Management 2. Business risk • These are risk which affect the Organization developing or producing the software. • Some of the business risks are: ❑ Building an excellent product or system that no one really wants (market risk) ❑ building a product that no longer fits into the overall business strategy for the company (strategic risk) ❑ The Sales force don't understand how to sell ❑ losing the support of senior management due to change in focus or change in people (management risk ) ❑ losing budgetary or personal commitment (budget risk)
  • 17. Software Risk Analysis & Management 3. project risk • These are risk which affect the Project schedule or resources. these risk occurs due to conditions and constraint about resources, relationship with vendors and contractors, unreliable vendors and lack of organizational support. Funding is the significant project risk the management has to face. it occurs due to initial budgeting constraint and unreliable customer payments.