Individual: Applying Risk Management Consulting Ramell Watts CMGT/430 AFSHIN SARDARYZADEH 26 Jul 17 Principles of Risk Management Identification of risk Analysis of risks Controlling of risks Risk Financing Management of claims. These principles are applied in the day to day lives of every individual both at home and at work. 2 How the Organization applies the risk management principles The organization identifies the risks that are presented to it through the principle of risk identification The organization evaluates the extent to which these risks could harm the firm through the second principle of risk analysis. The third principle offers opportunities for avoidance, prevention and reduction of the potential risks in the organization. The organization funds the process of mitigation of the possible risks using the fourth principle. The organization claims management using the fifth principle. . It categorizes the risks for the second process. Risk analysis is achieved by assessing the severity and vulnerability of the potential risks. This principle ensures that the organization minimizes the risks as much as it can. This can be by having the appropriate insurance cover for the cars in the firm. This happens when a loss occurs in the company. 3 How the Protection Efforts will vary The manner in which different organizations will address the risks will vary with time. There will be programs aimed at continuously establishing the risk management and protection efforts. The organization will need to update its risk management plan to accommodate the increasing changes. Social vulnerability will be addressed during the risk management process. It will be necessary to review the risk management plan of the organization to ensure that the plan is up to date. The strategies for the protection of the company’s resources as well as those of risk management will change over time. This is evident from the new ventures, changing work processes, changing rules and the increasing opportunities of risks due to the increasing use of internet technology 4 Threat, Vulnerability, and Risk Threat TypeThreatExploit/VulnerabilityExposed Riskinternal threat (artificial)IntruderAbsence of securityTheft external threat(artificial)HackerMisconfigured firewallLoss of informationinternal threat (Artificial)Current employeeAbsence of audit policyLoss of integrity; NaturalFireInadequate fire controlDamage and loss of lives NaturalHurricaneInadequate preparationDamage or loss of lifeSpiteful external threatVirusexpired antivirus softwareInfection of virusTechnical internal threatHard drive failureAbsence of back upData loss Handling Risk Risk reduction Risk transference Risk acceptance Risk rejection Implementing an alternative cause of action to help reduce the risk. Purchasing insurance to transfer a portion or all of the potential cost of a loss to a third party Dealing with risk by accepting the potential cost and loss if the risk o.