 |
|
  |
 |
 |
 |
|
Use
i-Meliore's e-Learning center to browse articles, white papers
and research papers on technologies that make a difference today
and that can be used to build the systems of tomorrow  |
 |
 |
|
 |
e-Learning:
Risk Management
Schedule
Risk Analysis
The critical path method (CPM) of scheduling a project is a key tool
for project management. A schedule “network” represents
the project strategy. Activities, where the work is accomplished,
are linked by relationships (e.g. finish-start, start-start, finish-to-finish)
showing how the work is planned. Strings of linked predecessor and
successor activities constitute “paths” through the network.
When two or more paths are to be done simultaneously, they are described
as parallel paths. Some of the most important points in the project
are where several parallel paths converge. At these merge or join
points, the paths must all be completed before a milestone is recorded
for payment, an inspection can be done, sub-assemblies can be integrated
for testing or the project can be recorded as complete.
Security
Risk Analysis and Management White Paper
Risk Analysis helps establish a good security posture; Risk Management
keeps it that way. Security measures cannot assure 100% protection
against all threats. Therefore, risk analysis, which is the process
of evaluating system vulnerabilities and the threats facing it, is
an essential part of any risk management program. The analysis process
identifies the probable consequences or risks associated with the
vulnerabilities and provides the
basis for establishing a cost-effective security program. Risk management
is the process of implementing and maintaining countermeasures that
reduce the effects of risk to an acceptable level. The risk analysis
process gives management the information it needs to make educated
judgments concerning information security. The procedure identifies
the existing security controls, calculates vulnerabilities, and evaluates
the effect of threats on each area of vulnerability.
Software
Risk Management
This paper presents a holistic vision of the risk-based methodologies
for Software Risk Management (SRM) developed at the Software Engineering
Institute (SEI). SRM methodologies address the entire life cycle of
software acquisition, development, and maintenance. This paper is
driven by the premise that the ultimate efficacy of the developed
methodologies and tools for software engineering is to buy smarter,
manage more effectively, identify opportunities for continuous improvement,
use available information and databases more efficiently, improve
industry, raise the community’s playing field, and review and
evaluate progress. The methodologies are based on seven management
principles: shared product vision, teamwork, global perspective, forward-looking
view, open communication, integrated management, and continuous process.
Building a Security Framework:
A Comprehensive Risk Management Guide
If only each IT manager had a crystal ball to help them predict
hack attacks, viruses and system failures. Until such a time, IT is
increasingly relying on risk management methodology to help them plan
ahead for breaches in network security. In the past, IT relied on
common sense, intuition and a healthy dose of good luck to fortify
the network against impending threats. However, with technology and
networks now critical to corporate performance, intuition and good
luck do not provide sufficient assurance against IT error and oversights.
Senior management and shareholders are demanding a more structured
and scientific approach to managing and mitigating network risk.
|
|
|
 |