SlideShare a Scribd company logo
Risk Analysis & Management
Priyajit Sen
Assistant Professor
Department of Computer Application
MAKAUT, W.B., India
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
What is risk?
A risk is a potential problem that might happen and might not. It can be
conceptually defined as concerns of future happenings that involve
change in mind, option, actions, places, etc.
Basic Characteristics of Risk:
Uncertainty:- It may or may not happen, that is there is no 100%
guarantee of risk becoming true.
Loss:- If the risk becomes true then unwanted consequences or
losses may occur.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
What is risk management?
Risk Management is a process of thinking systematically about all
possible risks, problems or disasters before they happen and setting up
procedures that will avoid the risk, or minimize the impact, or cope
with its impact.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Types of Risk:
Reactive:- A response based risk management approach, which is
dependent on accident evaluation and audit based findings.
Proactive:- Adaptive, closed loop feedback control strategy based on
measurement, observation of the present safety level and planned
explicit target safety level with a creative intellectuality.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Purpose of Proactive and Reactive Risk Management:
Reactive risk management: Reactive risk management attempts to
reduce the tendency of the same or similar accidents which happened in
past being repeated in future.
Proactive risk management: Proactive risk management attempts to
reduce the tendency of any accident happening in future by identifying
the boundaries of activities, where a breach of the boundary can lead to
an accident.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Difference between Proactive and Reactive Risk Management
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Categories of risk
Project risk:- Risk that affect the project schedule or recourse. An example
of a project risk is the loss of an experienced designer. Finding a replacement,
may take a long time and consequently, the software design will take longer to
complete.
Product Risk:- Risk that affect the quality or performance of the software
being developed. An example of a product risk is the failure of a purchased
component to perform as expected.
Business Risk:- Risk that affect the organization developing or procuring the
product. For example, a competitor introducing a new product. The
introduction of a competitive product may mean that the assumption made
about the sales of existing software products may be unduly optimistic.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Process of Risk management
Risk Identification: Identity possible project, product and business risks.
Risk Projection: Assessment of the likelihood and consequences of these
risks.
Risk Mitigation: Plan to address the risk, either by avoiding it or minimize
effects on the project.
Risk Monitoring: Regularly assess the risk and the plan
revise these when we learn more about the risk.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Process of Risk management
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Risk Identification
Basically, there are six types of risks.
Organizational Risks: Drive from the organizational environment where the
software is being developed.
Tools Risks: Drive from the software tools and other supporting software
used to develop the system.
Requirement Risks: Drive from changes to the customer requirements and
the process of managing the requirements change.
Estimation Risks: Drive from the management estimates of the resources
required to build the system.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Risk Projection
The likelihood of a risk coming true(r).
The consequence of the problems associated with that risk(s).
Based on these two factors, the priority of each risk can be computed
as:
p = r * s
Where p is the priority with which the risk must be handled, r is the probability of
the risk becoming true
and s is the severity of damage caused due to the risk becoming true.
If all identified risks are prioritized then most likely and damaging risks can be
handled first and more comprehensive risk abatement procedures can be designed
for these risks.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Risk Refinement:
This general condition can be refined in the following manner:
Sub-condition 1: Certain reusable components were developed by a
third party with no knowledge of internal design standards.
Sub-condition 2: The design standard for component interfaces has not
been solidified and may not conform to certain existing reusable
components.
Sub-condition 3: Certain reusable components have been implemented
in a language that is not supported on the target environment.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Risk Mitigation
Avoid Risk: The probability that the risk will arise will be reduce. It may
take several forms such as discussions with the customer to reduce the
scope of the work, giving incentives to engineers to avoid risk of man
power turn over, etc.
Transfer Risk: This strategy involves getting the risky component
developed by third party or buying insurance career, etc.
Risk Reduction: This involves planning ways to contain the damage due
to a risk. For example, if there is risk that some key personnel might
leave, new recruitment may be planned.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Risk Monitoring & Management
Risk monitoring and management is the process of checking that our
assumptions about the project, product and business risks have not
changed.
We should regularly assess each of the identified risk to decide whether
or not that risk is becoming more or less probable.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
RMMM Plan
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Safety Critical Software
Primary safety-critical software: Malfunctioning of this kind
of software could cause direct human or environment damage.
Secondary safety-critical software: Malfunctioning of this
software could cause indirect human or environment damage.
For example if a drug dispensing machine gave out the wrong
drugs to someone, the system itself would not cause damage, but
it would be the reason that damage was caused.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Different Hazards:
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Industry Analysis Techniques:
A number of hazard analysis techniques have been developed in order to fully
understand and
resolve these hazards.
An example of this is the STAMP technique which was developed at MIT, and
is not only for hazard analysis, but also considers organizational factors and
the dynamics of complex systems.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
STAMP has five steps:
1. Identify the system hazards: identify all of the potential hazards in a system and
expand on them to find rough solutions
2. Identify safety related requirements and constraints: In order to remove the
hazard what are the constraints
3. Define the basic system control structure: Define who is in control at the time
of the potential hazard
4. Identify inadequate control actions that could lead to a hazard: Find out how the
system reaches the hazardous state using the control structure.
5. Determine what constraints could be violated and eliminate, prevent or control
them through the system design
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Project Scheduling and Techniques:
Break down each activity into tasks.
Determine the dependency among different tasks.
Establish the estimates for the time durations necessary to complete the tasks.
Represent the information in the form of an activity network.
Determine task starting and ending dates from the information represented in
the activity network.
Determine the critical path. A critical path is a chain of tasks that determines
the duration of the project.
Allocate resources to tasks.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Work breakdown structure:
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Contd…
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
How long to decompose?
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Activity networks
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Activity networks
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Specification
15
Design Database
45
Design GUI
30
Write User
Manual
60
Code Database
105
Code GUI
45
Integrate and
Test
120
Finish
0
Contd…
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Contd…
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Critical Path Method:
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Contd…
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Contd…
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Project Parameters for Different Task:
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
(ES, EF)
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Specification
(0,15)
Design Database
(15,60)
Design GUI
(15,45)
Write User
Manual
(15,75)
Code Database
(60,165)
Code GUI
(45,90)
Integrate and
Test
(165,285)
Finish
(285,285)
** Highest Earliest Finish to its Next Earliest Start
(LS, LF)
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Specification
(0,15)
Design Database
(15,60)
Design GUI
(90,120)
Write User
Manual
(225,285)
Code Database
(60,165)
Code GUI
(120,165)
Integrate and
Test
(165,285)
Finish
(285,285)
** Lowest Latest Start to its Previous Latest Finish
Contd…
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Showing the Critical Path:
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Specification
(0,15)
Design Database
(15,60)
Design GUI
(90,120)
Write User
Manual
(225,285)
Code Database
(60,165)
Code GUI
(120,165)
Integrate and
Test
(165,285)
Finish
(285,285)
** The blue line shows the Critical Path. Note that the slack time is zero for these
phases.
Gantt chart:
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
• Gantt Chart first developed by Henry Gantt in 1917.
• Gantt chart usually utilized in project management, and it is one of the most
popular and helpful ways of showing activities displayed against time.
• Each activity represented by a bar. Gantt chart is a useful tool when you
want to see the entire landscape of either one or multiple projects.
• It helps you to view which tasks are dependent on one another and which
event is coming up.
Contd…
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
PERT Chart:
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
PERT is an acronym of Programme Evaluation Review Technique.
In the 1950s, it is developed by the U.S. Navy to handle the Polaris submarine missile
programme.
In Project Management, PERT chart represented as a network diagram concerning the number
of nodes, which represents events.
The direction of the lines indicates the sequence of the task. In the above example, tasks
between "Task 1 to Task 9" must complete, and these are known as a dependent or serial task.
Between Task 4 and 5, and Task 4 and 6, nodes are not depended and can undertake
simultaneously. These are known as Parallel or concurrent tasks. Without resource or
completion time, the task must complete in the sequence which is considered as event
dependency, and these are known as Dummy activity and represented by dotted lines.
Contd…
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
PERT vs Gantt Chart:
PERT charts are network diagrams that use boxes to represent tasks and
arrows to present dependencies between tasks. The boxes are laid out from
left to right, but there is no fixed Y-axis with dates. The first box, or root, is
centered vertically on the left side, and the subsequent tasks can be drawn
anywhere along the Y-axis. Arrows can point to the right, up or down, but
never to the left.
Gantt charts are bar graphs. The X-axis contains dates and the Y-axis lists
separate tasks. On each line of the Y-axis, the chart depicts a bar positioned to
extend from the task’s start date to its end date. Tasks are listed in the start-
date order.
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India
Gantt chart PERT chart
Gantt chart is defined as the bar chart. PERT chart looks similar to a network diagram
Gantt chart was developed by Henry L. Gantt.
PERT chart was developed by the United States
navy.
Gantt chart is often used for Small Projects
PERT chart can be used for large and complex
Projects
Gantt chart focuses on the time required to
complete a task
PERT chart focuses on the dependency of
relationships.
Gantt chart is simpler and more straightforward
PERT chart could be sometimes confusing and
complex but can be used for visualizing critical
path
Contd…
THANK YOU
Priyajit Sen, Department of Computer Applications, MAKAUT,
W.B., India

More Related Content

Similar to Software Risk Management.pptx

riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdf
WilliamTom9
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
RanjitKdk
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
saurabhshertukde
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
iaemedu
 
Online examination system
Online examination systemOnline examination system
Online examination system
Rahul Khanwani
 
MBA_Project_Presentation
MBA_Project_PresentationMBA_Project_Presentation
MBA_Project_Presentation
Rohit Sasidharan
 
Assignment 1.docx
Assignment 1.docxAssignment 1.docx
Assignment 1.docx
Umair Abbas
 
Lecture 2 introduction to Software Engineering 1
Lecture 2   introduction to Software Engineering 1Lecture 2   introduction to Software Engineering 1
Lecture 2 introduction to Software Engineering 1
IIUI
 
Guide to Software Estimation
Guide to Software EstimationGuide to Software Estimation
Guide to Software Estimation
Santosh Ramachandran
 
pressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.pptpressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.ppt
KhajaPasha33
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
MuhammadKashif703372
 
1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx
felicidaddinwoodie
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
YaseenNazir3
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
IRJET Journal
 
Risk Driven Approach to Test Device Software
Risk Driven Approach to Test Device SoftwareRisk Driven Approach to Test Device Software
Risk Driven Approach to Test Device Software
ijtsrd
 
Project Mangement Planning and Risk Analysis
Project Mangement Planning and Risk AnalysisProject Mangement Planning and Risk Analysis
Project Mangement Planning and Risk Analysis
Pramod Parajuli
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET Journal
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdf
PriyanshTan
 
Risk-management
 Risk-management Risk-management
Risk-management
Umesh Gupta
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
ShudipPal
 

Similar to Software Risk Management.pptx (20)

riskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdfriskanalysis-120305101118-phpapp02.pdf
riskanalysis-120305101118-phpapp02.pdf
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
MBA_Project_Presentation
MBA_Project_PresentationMBA_Project_Presentation
MBA_Project_Presentation
 
Assignment 1.docx
Assignment 1.docxAssignment 1.docx
Assignment 1.docx
 
Lecture 2 introduction to Software Engineering 1
Lecture 2   introduction to Software Engineering 1Lecture 2   introduction to Software Engineering 1
Lecture 2 introduction to Software Engineering 1
 
Guide to Software Estimation
Guide to Software EstimationGuide to Software Estimation
Guide to Software Estimation
 
pressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.pptpressman-ch-25-chapte risk-management.ppt
pressman-ch-25-chapte risk-management.ppt
 
pressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.pptpressman-ch-25-risk-management.ppt
pressman-ch-25-risk-management.ppt
 
1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
 
Risk Driven Approach to Test Device Software
Risk Driven Approach to Test Device SoftwareRisk Driven Approach to Test Device Software
Risk Driven Approach to Test Device Software
 
Project Mangement Planning and Risk Analysis
Project Mangement Planning and Risk AnalysisProject Mangement Planning and Risk Analysis
Project Mangement Planning and Risk Analysis
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
risk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdfrisk-management-121021125051-phpapp02 (1).pdf
risk-management-121021125051-phpapp02 (1).pdf
 
Risk-management
 Risk-management Risk-management
Risk-management
 
Software Engineering (Risk Management)
Software Engineering (Risk Management)Software Engineering (Risk Management)
Software Engineering (Risk Management)
 

More from Priyajit Sen

Software Engineering Basics.pdf
Software Engineering Basics.pdfSoftware Engineering Basics.pdf
Software Engineering Basics.pdf
Priyajit Sen
 
Software Project Planning.pptx
Software Project Planning.pptxSoftware Project Planning.pptx
Software Project Planning.pptx
Priyajit Sen
 
Software Risk Management.pptx
Software Risk Management.pptxSoftware Risk Management.pptx
Software Risk Management.pptx
Priyajit Sen
 
Presentation on 21.11.2022.pptx
Presentation on 21.11.2022.pptxPresentation on 21.11.2022.pptx
Presentation on 21.11.2022.pptx
Priyajit Sen
 
One Week Online Staff Training Program (CC+IQAC).pdf
One Week Online Staff Training Program (CC+IQAC).pdfOne Week Online Staff Training Program (CC+IQAC).pdf
One Week Online Staff Training Program (CC+IQAC).pdf
Priyajit Sen
 
One week online executive training program (cc+iqac)
One week online executive training program (cc+iqac)One week online executive training program (cc+iqac)
One week online executive training program (cc+iqac)
Priyajit Sen
 

More from Priyajit Sen (6)

Software Engineering Basics.pdf
Software Engineering Basics.pdfSoftware Engineering Basics.pdf
Software Engineering Basics.pdf
 
Software Project Planning.pptx
Software Project Planning.pptxSoftware Project Planning.pptx
Software Project Planning.pptx
 
Software Risk Management.pptx
Software Risk Management.pptxSoftware Risk Management.pptx
Software Risk Management.pptx
 
Presentation on 21.11.2022.pptx
Presentation on 21.11.2022.pptxPresentation on 21.11.2022.pptx
Presentation on 21.11.2022.pptx
 
One Week Online Staff Training Program (CC+IQAC).pdf
One Week Online Staff Training Program (CC+IQAC).pdfOne Week Online Staff Training Program (CC+IQAC).pdf
One Week Online Staff Training Program (CC+IQAC).pdf
 
One week online executive training program (cc+iqac)
One week online executive training program (cc+iqac)One week online executive training program (cc+iqac)
One week online executive training program (cc+iqac)
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 

Software Risk Management.pptx

  • 1. Risk Analysis & Management Priyajit Sen Assistant Professor Department of Computer Application MAKAUT, W.B., India Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 2. What is risk? A risk is a potential problem that might happen and might not. It can be conceptually defined as concerns of future happenings that involve change in mind, option, actions, places, etc. Basic Characteristics of Risk: Uncertainty:- It may or may not happen, that is there is no 100% guarantee of risk becoming true. Loss:- If the risk becomes true then unwanted consequences or losses may occur. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 3. What is risk management? Risk Management is a process of thinking systematically about all possible risks, problems or disasters before they happen and setting up procedures that will avoid the risk, or minimize the impact, or cope with its impact. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 4. Types of Risk: Reactive:- A response based risk management approach, which is dependent on accident evaluation and audit based findings. Proactive:- Adaptive, closed loop feedback control strategy based on measurement, observation of the present safety level and planned explicit target safety level with a creative intellectuality. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 5. Purpose of Proactive and Reactive Risk Management: Reactive risk management: Reactive risk management attempts to reduce the tendency of the same or similar accidents which happened in past being repeated in future. Proactive risk management: Proactive risk management attempts to reduce the tendency of any accident happening in future by identifying the boundaries of activities, where a breach of the boundary can lead to an accident. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 6. Difference between Proactive and Reactive Risk Management Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 7. Categories of risk Project risk:- Risk that affect the project schedule or recourse. An example of a project risk is the loss of an experienced designer. Finding a replacement, may take a long time and consequently, the software design will take longer to complete. Product Risk:- Risk that affect the quality or performance of the software being developed. An example of a product risk is the failure of a purchased component to perform as expected. Business Risk:- Risk that affect the organization developing or procuring the product. For example, a competitor introducing a new product. The introduction of a competitive product may mean that the assumption made about the sales of existing software products may be unduly optimistic. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 8. Process of Risk management Risk Identification: Identity possible project, product and business risks. Risk Projection: Assessment of the likelihood and consequences of these risks. Risk Mitigation: Plan to address the risk, either by avoiding it or minimize effects on the project. Risk Monitoring: Regularly assess the risk and the plan revise these when we learn more about the risk. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 9. Process of Risk management Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 10. Risk Identification Basically, there are six types of risks. Organizational Risks: Drive from the organizational environment where the software is being developed. Tools Risks: Drive from the software tools and other supporting software used to develop the system. Requirement Risks: Drive from changes to the customer requirements and the process of managing the requirements change. Estimation Risks: Drive from the management estimates of the resources required to build the system. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 11. Risk Projection The likelihood of a risk coming true(r). The consequence of the problems associated with that risk(s). Based on these two factors, the priority of each risk can be computed as: p = r * s Where p is the priority with which the risk must be handled, r is the probability of the risk becoming true and s is the severity of damage caused due to the risk becoming true. If all identified risks are prioritized then most likely and damaging risks can be handled first and more comprehensive risk abatement procedures can be designed for these risks. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 12. Risk Refinement: This general condition can be refined in the following manner: Sub-condition 1: Certain reusable components were developed by a third party with no knowledge of internal design standards. Sub-condition 2: The design standard for component interfaces has not been solidified and may not conform to certain existing reusable components. Sub-condition 3: Certain reusable components have been implemented in a language that is not supported on the target environment. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 13. Risk Mitigation Avoid Risk: The probability that the risk will arise will be reduce. It may take several forms such as discussions with the customer to reduce the scope of the work, giving incentives to engineers to avoid risk of man power turn over, etc. Transfer Risk: This strategy involves getting the risky component developed by third party or buying insurance career, etc. Risk Reduction: This involves planning ways to contain the damage due to a risk. For example, if there is risk that some key personnel might leave, new recruitment may be planned. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 14. Risk Monitoring & Management Risk monitoring and management is the process of checking that our assumptions about the project, product and business risks have not changed. We should regularly assess each of the identified risk to decide whether or not that risk is becoming more or less probable. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 15. RMMM Plan Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 16. Safety Critical Software Primary safety-critical software: Malfunctioning of this kind of software could cause direct human or environment damage. Secondary safety-critical software: Malfunctioning of this software could cause indirect human or environment damage. For example if a drug dispensing machine gave out the wrong drugs to someone, the system itself would not cause damage, but it would be the reason that damage was caused. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 17. Different Hazards: Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 18. Industry Analysis Techniques: A number of hazard analysis techniques have been developed in order to fully understand and resolve these hazards. An example of this is the STAMP technique which was developed at MIT, and is not only for hazard analysis, but also considers organizational factors and the dynamics of complex systems. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 19. STAMP has five steps: 1. Identify the system hazards: identify all of the potential hazards in a system and expand on them to find rough solutions 2. Identify safety related requirements and constraints: In order to remove the hazard what are the constraints 3. Define the basic system control structure: Define who is in control at the time of the potential hazard 4. Identify inadequate control actions that could lead to a hazard: Find out how the system reaches the hazardous state using the control structure. 5. Determine what constraints could be violated and eliminate, prevent or control them through the system design Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 20. Project Scheduling and Techniques: Break down each activity into tasks. Determine the dependency among different tasks. Establish the estimates for the time durations necessary to complete the tasks. Represent the information in the form of an activity network. Determine task starting and ending dates from the information represented in the activity network. Determine the critical path. A critical path is a chain of tasks that determines the duration of the project. Allocate resources to tasks. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 21. Work breakdown structure: Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 22. Contd… Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 23. How long to decompose? Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 24. Activity networks Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 25. Activity networks Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India Specification 15 Design Database 45 Design GUI 30 Write User Manual 60 Code Database 105 Code GUI 45 Integrate and Test 120 Finish 0
  • 26. Contd… Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 27. Contd… Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 28. Critical Path Method: Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 29. Contd… Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 30. Contd… Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 31. Project Parameters for Different Task: Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 32. (ES, EF) Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India Specification (0,15) Design Database (15,60) Design GUI (15,45) Write User Manual (15,75) Code Database (60,165) Code GUI (45,90) Integrate and Test (165,285) Finish (285,285) ** Highest Earliest Finish to its Next Earliest Start
  • 33. (LS, LF) Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India Specification (0,15) Design Database (15,60) Design GUI (90,120) Write User Manual (225,285) Code Database (60,165) Code GUI (120,165) Integrate and Test (165,285) Finish (285,285) ** Lowest Latest Start to its Previous Latest Finish
  • 34. Contd… Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 35. Showing the Critical Path: Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India Specification (0,15) Design Database (15,60) Design GUI (90,120) Write User Manual (225,285) Code Database (60,165) Code GUI (120,165) Integrate and Test (165,285) Finish (285,285) ** The blue line shows the Critical Path. Note that the slack time is zero for these phases.
  • 36. Gantt chart: Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India • Gantt Chart first developed by Henry Gantt in 1917. • Gantt chart usually utilized in project management, and it is one of the most popular and helpful ways of showing activities displayed against time. • Each activity represented by a bar. Gantt chart is a useful tool when you want to see the entire landscape of either one or multiple projects. • It helps you to view which tasks are dependent on one another and which event is coming up.
  • 37. Contd… Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 38. PERT Chart: Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India PERT is an acronym of Programme Evaluation Review Technique. In the 1950s, it is developed by the U.S. Navy to handle the Polaris submarine missile programme. In Project Management, PERT chart represented as a network diagram concerning the number of nodes, which represents events. The direction of the lines indicates the sequence of the task. In the above example, tasks between "Task 1 to Task 9" must complete, and these are known as a dependent or serial task. Between Task 4 and 5, and Task 4 and 6, nodes are not depended and can undertake simultaneously. These are known as Parallel or concurrent tasks. Without resource or completion time, the task must complete in the sequence which is considered as event dependency, and these are known as Dummy activity and represented by dotted lines.
  • 39. Contd… Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India
  • 40. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India PERT vs Gantt Chart: PERT charts are network diagrams that use boxes to represent tasks and arrows to present dependencies between tasks. The boxes are laid out from left to right, but there is no fixed Y-axis with dates. The first box, or root, is centered vertically on the left side, and the subsequent tasks can be drawn anywhere along the Y-axis. Arrows can point to the right, up or down, but never to the left. Gantt charts are bar graphs. The X-axis contains dates and the Y-axis lists separate tasks. On each line of the Y-axis, the chart depicts a bar positioned to extend from the task’s start date to its end date. Tasks are listed in the start- date order.
  • 41. Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India Gantt chart PERT chart Gantt chart is defined as the bar chart. PERT chart looks similar to a network diagram Gantt chart was developed by Henry L. Gantt. PERT chart was developed by the United States navy. Gantt chart is often used for Small Projects PERT chart can be used for large and complex Projects Gantt chart focuses on the time required to complete a task PERT chart focuses on the dependency of relationships. Gantt chart is simpler and more straightforward PERT chart could be sometimes confusing and complex but can be used for visualizing critical path Contd…
  • 42. THANK YOU Priyajit Sen, Department of Computer Applications, MAKAUT, W.B., India