SlideShare a Scribd company logo
1 of 20
U08784
RISK ANALYSIS
GROUP 5
Singapore Furniture Company also known
as SFC is a furniture business company. The
CEO decided to implement a web based
application that is similar to a e-commerce
website.
As the assigned project manager of this
project for SFC. After given direct approval
by our manager of Biz World Ltd. Next step,
is to proceed onto Risk Management.
It is a method that includes
identifying, monitoring and risk
management through prioritization
and assessment of risks that may
affect the project development. By
sorting out the probability and its
impact to the project, we can
determine the priorities on risks
that are to be dealt with
immediately without hesitation.
List of Risks identified:
 The use of new technology that may affect data communication.
 Software development time may not be sufficient.
 Technical issues with development software.
 Project size may be calculated wrongly.
 Software quality may not be as expected.
 Customer Requirement may change.
 Inexperienced development team.
 Lack of staff commitment to productivity.
 Customer may not be interested in the product.
 Project funding may stopped.
1. The use of new technology that
   may affect data communication
2. Software Development time may
   not be sufficient.
The use of new technology that
may affect data communication
With the use of Cloud networking. It
can automatically distribute all the
essential tools and data information to
the company through the internet
without the need of installing software
applications. The risks are: software or
hardware compatibility, performance
issues, network interruption and most
importantly data security.
 Data must be secured.
 Network traffic must be monitored.
 System must be backward compatible.
 List of Alternative Internet Service Providers(ISP)
 Assign a CERT(Computer Emergency Response Team)
 Development team must include a security specialist.
 System must be through multiple test phases and situations.
 System must be updated frequently to prevent and fix issues from
 occurring.
 Security procedures must be practiced.
 It must uphold software standards.
 System must be error-free especially when it affects the
 system framework.
 Monitor the system performance to avoid potential network
 issues in the future.
 Security Breached
The data must be secured and stopped to prevent any more data
exposure. Assigning a CERT(Computer Emergency Response
Team) is recommended.
 Network Disruption
The use of alternative internet service provider or usage of new
network hardware.
 Software Compatibility
The team must identify/track the source of the problem and provide
a resolution.
The estimated cost to resolve the problem
is $20,000. The time delay can last at least
  6 months with an additional work force
              of 2 members.
Software development time
may not be sufficient
It is difficult to estimate an accurate development time
due to it being constantly updated with new functions
such as customer requirements, error fixes and visual
changes.
 There must an agreement and understanding between the
 end users and the development team
 The development progress must be monitored more often.
 Limit the number of customer requirements.
 When team development progress does not meet the
 specified work quota.
 Team must be aware of any errors they encounter.
 Ensure the system is up to its standards.
 Identify the number of customer requirement left over.
 Inform the team management of the issue.
 Reduce the number of customer requirements without
 affecting software quality.
 Enlist additional human workforce when needed.
 Recalculate the additional cost, time and effort needed to
 meet the project deadline.
The estimated cost to resolve the problem is $8000,
 and additional time delay will last at least 1 month
with an additional work force of 2 members to the
                  development team.
 The total risk damage cost is $28,000 in total
 (Combination of the first major risk and second major
 risk $20,000 + $8000). The estimated time delay
 would be 7 months all together with an additional
 workforce of 4 team members in total.
U08784 RISK ANALYSIS
GROUP # 5
Title: Software Engineering A Practitioner’s Approach Sixth Edition
Author: Roger S. Pressman
Year: 2005
Images
 http://thumbs.dreamstime.com/thumblarge_488/12690317586G6wYK.jpg
 http://www.datatrend.com/optimize-it/wp-content/uploads/2012/04/cloud-computing-
  datatrend.jpg
 http://www.core.org.cn/NR/rdonlyres/Architecture/4-296Spring-2005/16F387EC-30AD-
  42A0-990F-98B11E0085FE/0/chp_bending.jpg
 http://www.secondtimearoundrefinishing.com/images/furniture-building.jpg
 http://3.bp.blogspot.com/-
  lmrfv1Y_pYQ/UItEiJGlk2I/AAAAAAAACdM/MA2nIrjWdMU/s1600/checklist.jpg

More Related Content

What's hot

Incident Response Test
Incident Response TestIncident Response Test
Incident Response TestSiemplify
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramCigital
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020developeronrents
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application SecurityCigital
 
The ins and outs of effective incident response
The ins and outs of effective incident responseThe ins and outs of effective incident response
The ins and outs of effective incident responseCyberhat
 
Increasing reliability and safety
Increasing reliability and safetyIncreasing reliability and safety
Increasing reliability and safetyasfiul123
 
What will testing look like in year 2020
What will testing look like in year 2020What will testing look like in year 2020
What will testing look like in year 2020BugRaptors
 
Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Cigital
 
Is it Safe? measuring product security goodness
Is it Safe?   measuring product security goodnessIs it Safe?   measuring product security goodness
Is it Safe? measuring product security goodnessJustin Berman
 
The site security survey process
The site security survey processThe site security survey process
The site security survey processcomplianceonline123
 
5 Models for Enterprise Software Security Management Teams
5 Models for Enterprise Software Security Management Teams 5 Models for Enterprise Software Security Management Teams
5 Models for Enterprise Software Security Management Teams Cigital
 
Google Cloud Summit - Solving Reliability Fears with SRE
Google Cloud Summit - Solving Reliability Fears with SREGoogle Cloud Summit - Solving Reliability Fears with SRE
Google Cloud Summit - Solving Reliability Fears with SREChun-Chiao Li
 
CTO Summit NASDAQ NYC 2017: Creating a QA Strategy
CTO Summit NASDAQ NYC 2017: Creating a QA StrategyCTO Summit NASDAQ NYC 2017: Creating a QA Strategy
CTO Summit NASDAQ NYC 2017: Creating a QA StrategyRainforest QA
 
Are We Secure? Answering the Unanswerable
Are We Secure? Answering the UnanswerableAre We Secure? Answering the Unanswerable
Are We Secure? Answering the UnanswerableJustin Berman
 
3. introduction to software testing
3. introduction to software testing3. introduction to software testing
3. introduction to software testingChandra Maddigapu
 
Fundamentals of testing
Fundamentals of testingFundamentals of testing
Fundamentals of testingMarni -
 

What's hot (20)

Incident Response Test
Incident Response TestIncident Response Test
Incident Response Test
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security Program
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020
 
QMSS Root Cause Analysis - Sample Slides
QMSS Root Cause Analysis - Sample SlidesQMSS Root Cause Analysis - Sample Slides
QMSS Root Cause Analysis - Sample Slides
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application Security
 
The ins and outs of effective incident response
The ins and outs of effective incident responseThe ins and outs of effective incident response
The ins and outs of effective incident response
 
Increasing reliability and safety
Increasing reliability and safetyIncreasing reliability and safety
Increasing reliability and safety
 
Session15
Session15Session15
Session15
 
5 reasons why erp implementations fail
5 reasons why erp implementations fail5 reasons why erp implementations fail
5 reasons why erp implementations fail
 
What will testing look like in year 2020
What will testing look like in year 2020What will testing look like in year 2020
What will testing look like in year 2020
 
Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!
 
Is it Safe? measuring product security goodness
Is it Safe?   measuring product security goodnessIs it Safe?   measuring product security goodness
Is it Safe? measuring product security goodness
 
The site security survey process
The site security survey processThe site security survey process
The site security survey process
 
5 Models for Enterprise Software Security Management Teams
5 Models for Enterprise Software Security Management Teams 5 Models for Enterprise Software Security Management Teams
5 Models for Enterprise Software Security Management Teams
 
Google Cloud Summit - Solving Reliability Fears with SRE
Google Cloud Summit - Solving Reliability Fears with SREGoogle Cloud Summit - Solving Reliability Fears with SRE
Google Cloud Summit - Solving Reliability Fears with SRE
 
CTO Summit NASDAQ NYC 2017: Creating a QA Strategy
CTO Summit NASDAQ NYC 2017: Creating a QA StrategyCTO Summit NASDAQ NYC 2017: Creating a QA Strategy
CTO Summit NASDAQ NYC 2017: Creating a QA Strategy
 
Are We Secure? Answering the Unanswerable
Are We Secure? Answering the UnanswerableAre We Secure? Answering the Unanswerable
Are We Secure? Answering the Unanswerable
 
3. introduction to software testing
3. introduction to software testing3. introduction to software testing
3. introduction to software testing
 
Fundamentals of testing
Fundamentals of testingFundamentals of testing
Fundamentals of testing
 
Fundamentals of testing
Fundamentals of testingFundamentals of testing
Fundamentals of testing
 

Similar to U08784 part 2 presentation

How to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdfHow to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdfVrinsoft Technology
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxalanfhall8953
 
Lecture 2 introduction to Software Engineering 1
Lecture 2   introduction to Software Engineering 1Lecture 2   introduction to Software Engineering 1
Lecture 2 introduction to Software Engineering 1IIUI
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxmonicafrancis71118
 
1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of wSantosConleyha
 
1. project description definition of project the supervision of w
1. project description definition of project the supervision of w1. project description definition of project the supervision of w
1. project description definition of project the supervision of wSUKHI5
 
1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of wAbbyWhyte974
 
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxhelzerpatrina
 
Defect effort prediction models in software
Defect effort prediction models in softwareDefect effort prediction models in software
Defect effort prediction models in softwareIAEME Publication
 
235429094 jobportal-documentation
235429094 jobportal-documentation235429094 jobportal-documentation
235429094 jobportal-documentationsireesha nimmagadda
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projectsiaemedu
 
Feature Prioritization Techniques for an Agile PMs by Microsoft PM
Feature Prioritization Techniques for an Agile PMs by Microsoft PMFeature Prioritization Techniques for an Agile PMs by Microsoft PM
Feature Prioritization Techniques for an Agile PMs by Microsoft PMProduct School
 
Online Exam Management System(OEMS)
Online Exam Management System(OEMS)Online Exam Management System(OEMS)
Online Exam Management System(OEMS)PUST
 
Project Planning & Management
Project Planning & Management Project Planning & Management
Project Planning & Management Anit Thapaliya
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxtienboileau
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEeAuditor Audits & Inspections
 

Similar to U08784 part 2 presentation (20)

How to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdfHow to Estimate Software Development Project Cost.pdf
How to Estimate Software Development Project Cost.pdf
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Lecture 2 introduction to Software Engineering 1
Lecture 2   introduction to Software Engineering 1Lecture 2   introduction to Software Engineering 1
Lecture 2 introduction to Software Engineering 1
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
 
1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w
 
1. project description definition of project the supervision of w
1. project description definition of project the supervision of w1. project description definition of project the supervision of w
1. project description definition of project the supervision of w
 
1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w
 
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
 
Defect effort prediction models in software
Defect effort prediction models in softwareDefect effort prediction models in software
Defect effort prediction models in software
 
Estimation
EstimationEstimation
Estimation
 
235429094 jobportal-documentation
235429094 jobportal-documentation235429094 jobportal-documentation
235429094 jobportal-documentation
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
 
Feature Prioritization Techniques for an Agile PMs by Microsoft PM
Feature Prioritization Techniques for an Agile PMs by Microsoft PMFeature Prioritization Techniques for an Agile PMs by Microsoft PM
Feature Prioritization Techniques for an Agile PMs by Microsoft PM
 
Project Estimation.ppt
Project Estimation.pptProject Estimation.ppt
Project Estimation.ppt
 
Project Estimation.ppt
Project Estimation.pptProject Estimation.ppt
Project Estimation.ppt
 
Online Exam Management System(OEMS)
Online Exam Management System(OEMS)Online Exam Management System(OEMS)
Online Exam Management System(OEMS)
 
Project Planning & Management
Project Planning & Management Project Planning & Management
Project Planning & Management
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 

U08784 part 2 presentation

  • 2. Singapore Furniture Company also known as SFC is a furniture business company. The CEO decided to implement a web based application that is similar to a e-commerce website. As the assigned project manager of this project for SFC. After given direct approval by our manager of Biz World Ltd. Next step, is to proceed onto Risk Management.
  • 3. It is a method that includes identifying, monitoring and risk management through prioritization and assessment of risks that may affect the project development. By sorting out the probability and its impact to the project, we can determine the priorities on risks that are to be dealt with immediately without hesitation.
  • 4. List of Risks identified:  The use of new technology that may affect data communication.  Software development time may not be sufficient.  Technical issues with development software.  Project size may be calculated wrongly.  Software quality may not be as expected.  Customer Requirement may change.  Inexperienced development team.  Lack of staff commitment to productivity.  Customer may not be interested in the product.  Project funding may stopped.
  • 5. 1. The use of new technology that may affect data communication 2. Software Development time may not be sufficient.
  • 6. The use of new technology that may affect data communication
  • 7. With the use of Cloud networking. It can automatically distribute all the essential tools and data information to the company through the internet without the need of installing software applications. The risks are: software or hardware compatibility, performance issues, network interruption and most importantly data security.
  • 8.  Data must be secured.  Network traffic must be monitored.  System must be backward compatible.  List of Alternative Internet Service Providers(ISP)  Assign a CERT(Computer Emergency Response Team)  Development team must include a security specialist.  System must be through multiple test phases and situations.  System must be updated frequently to prevent and fix issues from occurring.
  • 9.  Security procedures must be practiced.  It must uphold software standards.  System must be error-free especially when it affects the system framework.  Monitor the system performance to avoid potential network issues in the future.
  • 10.  Security Breached The data must be secured and stopped to prevent any more data exposure. Assigning a CERT(Computer Emergency Response Team) is recommended.  Network Disruption The use of alternative internet service provider or usage of new network hardware.  Software Compatibility The team must identify/track the source of the problem and provide a resolution.
  • 11. The estimated cost to resolve the problem is $20,000. The time delay can last at least 6 months with an additional work force of 2 members.
  • 12. Software development time may not be sufficient
  • 13. It is difficult to estimate an accurate development time due to it being constantly updated with new functions such as customer requirements, error fixes and visual changes.
  • 14.  There must an agreement and understanding between the end users and the development team  The development progress must be monitored more often.  Limit the number of customer requirements.
  • 15.  When team development progress does not meet the specified work quota.  Team must be aware of any errors they encounter.  Ensure the system is up to its standards.  Identify the number of customer requirement left over.
  • 16.  Inform the team management of the issue.  Reduce the number of customer requirements without affecting software quality.  Enlist additional human workforce when needed.  Recalculate the additional cost, time and effort needed to meet the project deadline.
  • 17. The estimated cost to resolve the problem is $8000, and additional time delay will last at least 1 month with an additional work force of 2 members to the development team.
  • 18.  The total risk damage cost is $28,000 in total (Combination of the first major risk and second major risk $20,000 + $8000). The estimated time delay would be 7 months all together with an additional workforce of 4 team members in total.
  • 20. Title: Software Engineering A Practitioner’s Approach Sixth Edition Author: Roger S. Pressman Year: 2005 Images  http://thumbs.dreamstime.com/thumblarge_488/12690317586G6wYK.jpg  http://www.datatrend.com/optimize-it/wp-content/uploads/2012/04/cloud-computing- datatrend.jpg  http://www.core.org.cn/NR/rdonlyres/Architecture/4-296Spring-2005/16F387EC-30AD- 42A0-990F-98B11E0085FE/0/chp_bending.jpg  http://www.secondtimearoundrefinishing.com/images/furniture-building.jpg  http://3.bp.blogspot.com/- lmrfv1Y_pYQ/UItEiJGlk2I/AAAAAAAACdM/MA2nIrjWdMU/s1600/checklist.jpg

Editor's Notes

  1. Introduction of our Group Members and role as the Project Manager for Biz World Ltd – GL
  2. Short Introduction about the Company and also relating to the Risk Analysis Topic GL
  3. Explain the Risk Management Process
  4. Risk Analysis, This is the list of risk identified by our management team.
  5. There are many situations where the risk may occur.