J. Smith & Associates Company’s Risk Assessment Report

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

The paper represents a model of risk management, which has to be employed in the process of network reorganization, which is connected with the creation of a new J. Smith & Associates division in Scottsdale, Arizona. The prevention of the potential difficulties, which may arise in the project, has to be correlated with the essential aims of the reorganization. Thus, one has to note that the task of the company team is to ensure that 500 employees, who are currently working in the company, receive the opportunities to provide the required services to the customers and to communicate with each other within the workspace.

We will write a custom essay on your topic a custom Report on J. Smith & Associates Company’s Risk Assessment
808 writers online

Risk matrix

The illustration of the probable risks can be suggested with the help of a risk matrix, which assesses the likelihood and consequences of the possible difficulties. In the given project, the risks of networking reorganization are connected with several factors (Table 1).

Table 1. Risk Matrix

Risk TypeLikeability/OccurrenceConsequencesPreclusion
Data lossesUnlikeableOccasionalDisruption of cash flows and private data
  1. Data copying;
  2. Reliability testing
Hostname transmissionsLikelyAccess difficulties, loss of customersDSL and VPN names verification
Disconnections in the course of monitoringLikelyOperational failuresNon-working time testing and coding verification

The primary indicator of the planning effectiveness concerns ensuring data safety. Since the company already has its functioning history, the information losses can damage work infrastructure. The consequences of this risk may be compared to those, which followed power line breakage in New Mexico, in 2000. The catastrophe resulted in microchips’ damage, which evoked a disruption of numerous cash flows, information, and ended up with $400 million sales loss for the major companies (Chopra & Sodhi, 2004).

However, the risk may be avoided if the management of the company takes care of copying the data, which is gathered in the transferred systems and supplies, and saving it in the separate files. If data transmission is impossible, it might be beneficial to sustain system reliability tests before accomplishing reorganization operations. In the former case, the occurrence of the risk is reduced to “unlikeable” level, the latter one poses more threats and can be estimated as “occasional.”

Risk associated with the use of the installed service

The second critical risk of networking reorganization refers to the use of the installed service. Since the essential goal of facilities’ transfer concerns comfortable and safe employment as well as a successful performance of customers’ needs, it is critical making sure that the new systems would function appropriately. The risk, which may arise, refers to the fact that, quite often, changing locations for network systems evokes connectivity disruptions or hostname confusion.

The consequences of this type of risk encompass logging in problems, which may stimulate customers’ dissatisfaction with the services. The occurrence of the risk may be estimated as “likely.” Nevertheless, it is possible to avoid the risk if the work team performs diligent testing of the domain names on every transferred system as well as evaluates the functioning of DSL and VPN names. Finally, testing the connectivity of ICMP facilitates the operation of hostname verification, which precludes any potential confusion (Jigeesh, 2012).

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

System maintenance risk

Finally, the third critical risk of model implementation refers to system maintenance. The experts claim that computer systems are extremely vulnerable to disruptions in the first days after the implementation, due to the alternation of network signals and code positioning. That is why, the systems, which are transferred in the project, have to be placed under constant surveillance. Moreover, it is beneficial to sustain regular monitoring tests.

For instance, the verification of the basic TCP and UDP commands may enhance the productiveness of the coding systems. Nevertheless, it is critical noting that the essential risk, which is connected with system maintenance, refers to network breakages, which often occur in the course if testing. Disconnections may result in operational failures, which threaten service delivery. Due to the frequent breakages, the occurrence of the risk may be characterized as “likely.” The method of risk avoidance includes performing the verification procedures in non-working time so that to ensure network safety.

Conclusion

The sustainability of risk preventions is critical in any company project since a successful implementation of the modifications defines corporation’s success. In the discussed case, one can deduce that the efficient performance of prevention operations can lead to cost justification, which means that networking reorganization has to bring financial benefits, which could not have been met in the previous project; productivity: reorganization contributes to the increase of information technologies’ productivity; barriers’ breaking: the alternations help the company team to reach the goals, which could not be attained in the old model of system functioning; communication: since the primary aim of network systems’ functioning is providing customer services, risk management elaborates the quality of inter-corporation communication (Performing a security risk assessment, 2010).

Conclusively, the risk assessment proves that network organization can be successfully implemented if the management team sustains prevention of difficulties on three critical levels, which are implementation, monitoring, and evaluation since the outlined levels predetermine the successfulness of reorganization.

References

Chopra, S., & Sodhi, M. (2004). Web.

Jigeesh, N. (2012). Selection of Project as Important Beginning for Information Technology Project Management. IUP Journal of Operations Management, 1(1), 41-49.

(2010). Web.

Remember! This is just a sample
You can get your custom paper by one of our expert writers
Print
Need an custom research paper on J. Smith & Associates Company’s Risk Assessment written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2020, June 16). J. Smith & Associates Company's Risk Assessment. https://ivypanda.com/essays/j-smith-amp-associates-companys-risk-assessment/

Work Cited

"J. Smith & Associates Company's Risk Assessment." IvyPanda, 16 June 2020, ivypanda.com/essays/j-smith-amp-associates-companys-risk-assessment/.

References

IvyPanda. (2020) 'J. Smith & Associates Company's Risk Assessment'. 16 June.

References

IvyPanda. 2020. "J. Smith & Associates Company's Risk Assessment." June 16, 2020. https://ivypanda.com/essays/j-smith-amp-associates-companys-risk-assessment/.

1. IvyPanda. "J. Smith & Associates Company's Risk Assessment." June 16, 2020. https://ivypanda.com/essays/j-smith-amp-associates-companys-risk-assessment/.


Bibliography


IvyPanda. "J. Smith & Associates Company's Risk Assessment." June 16, 2020. https://ivypanda.com/essays/j-smith-amp-associates-companys-risk-assessment/.

Powered by CiteTotal, best referencing machine
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1