Logo

Navigation
  • Home
  • Services
    • ERP Solutions
    • Implementation Solutions
    • Support and Maintenance Solutions
    • Custom Solutions
    • Upgrade Solutions
    • Training and Mentoring
    • Web Solutions
    • Production Support
    • Architecture Designing
    • Independent Validation and Testing Services
    • Infrastructure Management
  • Expertise
    • Microsoft Development Expertise
    • Mobile Development
    • SQL Server Database and BI
    • SAP BI, SAP Hana, SAP BO
    • Oracle and BI
    • Oracle RAC
  • Technical Training
    • Learn Data Management
      • Business Intelligence
      • Data Mining
      • Data Modeling
      • Data Warehousing
      • Disaster Recovery
    • Learn Concepts
      • Application Development
      • Client Server
      • Cloud Computing Tutorials
      • Cluster Computing
      • CRM Tutorial
      • EDI Tutorials
      • ERP Tutorials
      • NLP
      • OOPS
      • Concepts
      • SOA Tutorial
      • Supply Chain
      • Technology Trends
      • UML
      • Virtualization
      • Web 2.0
    • Learn Java
      • JavaScript Tutorial
      • JSP Tutorials
      • J2EE
    • Learn Microsoft
      • MSAS
      • ASP.NET
      • ASP.NET 2.0
      • C Sharp
      • MS Project Training
      • Silverlight
      • SQL Server 2005
      • VB.NET 2005
    • Learn Networking
      • Networking
      • Wireless
    • Learn Oracle
      • Oracle 10g
      • PL/SQL
      • Oracle 11g Tutorials
      • Oracle 9i
      • Oracle Apps
    • Learn Programming
      • Ajax Tutorial
      • C Language
      • C++ Tutorials
      • CSS Tutorial
      • CSS3 Tutorial
      • JavaScript Tutorial
      • jQuery Tutorial
      • MainFrame
      • PHP Tutorial
      • VBScript Tutorial
      • XML Tutorial
    • Learn Software Testing
      • Software Testing Types
      • SQA
      • Testing
  • Career Training
    • Career Improvement
      • Career Articles
      • Certification Articles
      • Conflict Management
      • Core Skills
      • Decision Making
      • Entrepreneurship
      • Goal Setting
      • Life Skills
      • Performance Development
      • Personal Excellence
      • Personality Development
      • Problem Solving
      • Relationship Management
      • Self Confidence
      • Self Supervision
      • Social Networking
      • Strategic Planning
      • Time Management
    • Education Help
      • Career Tracks
      • Essay Writing
      • Internship Tips
      • Online Education
      • Scholarships
      • Student Loans
    • Managerial Skills
      • Business Communication
      • Business Networking
      • Facilitator Skills
      • Managing Change
      • Marketing Management
      • Meeting Management
      • Process Management
      • Project Management
      • Project Management Life Cycle
      • Project Management Process
      • Project Risk Management
      • Relationship Management
      • Task Management
      • Team Building
      • Virtual Team Management
    • Essential Life Skills
      • Anger Management
      • Anxiety Management
      • Attitude Development
      • Coaching and Mentoring
      • Emotional Intelligence
      • Stress Management
      • Positive Thinking
    • Communication Skills
      • Conversation Skills
      • Cross Culture Competence
      • English Vocabulary
      • Listening Skills
      • Public Speaking Skills
      • Questioning Skills
    • Soft Skills
      • Assertive Skills
      • Influence Skills
      • Leadership Skills
      • Memory Skills
      • People Skills
      • Presentation Skills
    • Finding a Job
      • Etiquette Tips
      • Group Discussions
      • HR Interviews
      • Interview Notes
      • Job Search Tips
      • Resume Tips
      • Sample Resumes
 

Qualitative Risk Analysis Methodology

By Exforsys | on March 23, 2009 |
Project Risk Management

Risk analysis can be broken down into two broad methods, and these methods are qualitative and quantitative. The qualitative method for risk analysis is designed for the purpose of enhancing one’s awareness of potential problems, and can assist one in analyzing these risks.

Quantitative risk analysis is designed so that the security measures can be implemented, and this will allow the cost envelope to be implemented as well. There is yet a third method for risk analysis which is used, and this is referred to as being the hybrid method, since it borrows characteristics from both the quantitative and qualitative risk analysis methods. Of the three approaches, the qualitative analysis is the most simple to use, and is therefore used the most often.

Qualitative analysis is useful because it allows one to quickly identify potential risks, as well as assets and resources which are vulnerable to these risks. Not only does qualitative analysis showcase the safety measures that have already been utilized, it will show those which could be useful if they are implemented.

The goal of qualitative risk analysis is to gain a level of risk protection which is acceptable, and one which will increase awareness among the necessary members of the organization. This analysis will often make use of calculations which are fairly basic, and it is often not necessary to know the value of all the assets in question.

While quantitative analysis does many of the same things which can be found with qualitative analysis, it is also capable of identifying the envelopes for which both safeguards and losses can be found. It is based on a process which is highly subjective, and it uses metrics which require it to have a high level of effort put into it.

At the same time, quantitative analysis is capable of presenting data in a manner which is friendly for management, and which expresses percentages, values, as well as probabilities. Now that we’ve gone over the two primary tools which are used for risk analysis, it is next important to learn a little bit about the methodology which is associated with them.

Risk Analysis Methodology

One piece of methodology that you will want to familiarize yourself with is the scope statement. The scope statement is one statement which is designed to define the things that must be evaluated, as well as state the form of risk analysis that will need to be performed. The scope statement must also be capable of giving the results which have been expected.

The next piece of methodology which is important to learn is called asset pricing. The information system will be defined based on the scope statement, and it will be further split into components which may be priced. While you have the option of splitting the system into smaller pieces, some say it is easier to simply take apart the entire unit, leaving on the components which are tangible.

The tangible components tend to be those which are easier to price. One good example of tangible components are the telecommunications tools that the organization uses. These includes tools which are internal as well as external. Any device which is used for communication purposes will need to be included in this category.

Some devices which are great examples of this include both modems, routers, and telephones, as well as intercom or PA systems. After communication tools have been considered, the next thing which must be taken into consideration is the software devices. This includes any type of software which must be programmed. Operating systems should be the first thing to come to mind.

Additional Considerations

Once you have incorporated everything related to software and software applications, you will next need to consider the physical equipment. The physical equipment will include things such as monitors, computers, and computer terminals.

Any object which is used for the purpose of displaying information must be considered. Printers should be included in this list, along with disk drives and memory cards. Power supplies should be factored in as well. Any systems which are designed for the purpose of holding data, such as error logs, usage logs, or info related to schedules, will need to be factored in the system as well.

« « Qualitative Risk Analysis
Risk Management Preparation » »

Author Description

Avatar

Editorial Team at Exforsys is a team of IT Consulting and Training team led by Chandra Vennapoosa.

Ads

Free Training

RSSSubscribe 417 Followers
Ads
  • Popular
  • Recent
  • How to Build a Risk Register

    March 27, 2009 - 0 Comment
  • Risk Response Planning

    March 26, 2009 - 0 Comment
  • Risk Management Master Plan

    March 30, 2009 - 0 Comment
  • Risk Management Preparation

    March 24, 2009 - 0 Comment
  • Understanding the Risk Management Process

    March 25, 2009 - 0 Comment
  • How to Use Expected Monetary Value (EMV)

    March 28, 2009 - 0 Comment
  • Risk Communication Rules

    March 29, 2009 - 0 Comment
  • What is Risk Management?

    March 20, 2009 - 0 Comment
  • How to Create an Effective Risk Management Plan

    March 21, 2009 - 0 Comment
  • Qualitative Risk Analysis

    March 22, 2009 - 0 Comment
  • Risk Management Master Plan

    March 30, 2009 - 0 Comment
  • Risk Communication Rules

    March 29, 2009 - 0 Comment
  • How to Use Expected Monetary Value (EMV)

    March 28, 2009 - 0 Comment
  • How to Build a Risk Register

    March 27, 2009 - 0 Comment
  • Risk Response Planning

    March 26, 2009 - 0 Comment
  • Understanding the Risk Management Process

    March 25, 2009 - 0 Comment
  • Risk Management Preparation

    March 24, 2009 - 0 Comment
  • Qualitative Risk Analysis

    March 22, 2009 - 0 Comment
  • How to Create an Effective Risk Management Plan

    March 21, 2009 - 0 Comment
  • What is Risk Management?

    March 20, 2009 - 0 Comment

Exforsys e-Newsletter

ebook
 

Related Articles

  • Risk Management Master Plan
  • Risk Communication Rules
  • How to Use Expected Monetary Value (EMV)
  • How to Build a Risk Register
  • Risk Response Planning

Latest Articles

  • Project Management Techniques
  • Product Development Best Practices
  • Importance of Quality Data Management
  • How to Maximize Quality Assurance
  • Utilizing Effective Quality Assurance Strategies
  • Sitemap
  • Privacy Policy
  • DMCA
  • Trademark Information
  • Contact Us
© 2021. All Rights Reserved.IT Training and Consulting
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Reject Read More
Privacy & Cookies Policy
Necessary Always Enabled