Steps Worked Example: Table 10-1 A Simple Risk Management Model

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

threat

The causes of the original threat. For example, web publishers may not be aware of
steps they could take; producers may be using standards incorrectly; or producers may
be at risk of business failure. This analysis might lead to action that addresses the
causes, such as education campaigns, the development of standards in conjunction
with producers, or development of indicators of impending business failure including
signs that web sits are not being maintained or personal knowledge that projects are
coming to a close.

Steps Worked example


1. Asset identification: identify what needs to be Online publication stored on a web site managed
protected, as specifically as possible by someone else
2. Threat identification: identify the threats that Access to a particular version of the online
appear to pose a risk to the programmes publication will be lost because the owner
objectives overwrites old versions with new versions
3. Probability assessment: estimate the likelihood Very likely to happen, based on previous history
of each threat happening of the site
4. Consequence assessment: estimate the likely Likely to result in complete loss of the old
impact if the threat did eventuate version, as the owner does not appear to maintain
an archive of overwritten versions
5. Risk level assessment: Calculate the level of High risk likely to happen and would result in
risk by combining the probability and complete loss
consequence
6. Mitigation: propose action that could reduce the Options contact site owner and suggest owner
likelihood or the impact of the threat, or both makes archived copies; negotiate permission to
take copies now; or to take copies before versions
are overwritten
7. Risk threshold: decide whether the level of risk Material is considered important so level of risk
is acceptable with or without mitigation action warrants taking mitigation measures
8. Allocation of ownership: determine who is The owner could be responsible but might not be
responsible for taking action, and any constraints willing to take action; programme could take
responsibility but may need permission
9. Priority setting: compare risk levels for High priority compared with other risks
identified threats and decide what ris ks should be
given priority
10. Reality checking: decide whether the risk and No lingering doubts - the analysis makes sense
priority assessments tally reasonably well with
expectations
11. Action triggers: decide whether action is Owner approves copying by the preservation
needed immediately; if not, identify some signs programme immediately before each version is
that will indicate when action is required overwritten, but cannot guarantee a schedule. The
programme decides to contact the owner regularly
for information on planned updates, and will
assess whether this proves to be an adequate
indicator.

Table 10-1 A simple risk management model

53

You might also like