Risk Analysis

Risk Analysis 
Risk Analysis is one of the important concepts in Software Product/Project Life Cycle. Risk analysis is broadly defined to include risk assessment, risk characterization, risk communication, risk management, and policy relating to risk. Risk Assessment is also called as Security risk analysis. 
Technical Definitions: 
Risk Analysis: A risk analysis involves identifying the most probable threats to an organization and analyzing the related vulnerabilities of the organization to these threats. 
Risk Assessment: A risk assessment involves evaluating existing physical and environmental security and controls, and assessing their adequacy relative to the potential threats of the organization. 
Business Impact Analysis: A business impact analysis involves identifying the critical business functions within the organization and determining the impact of not performing the business function beyond the maximum acceptable outage. Types of criteria that can be used to evaluate the impact include: customer service, internal operations, legal/statutory and financial. 
Risks for a software product can be categorized into various types. Some of them are: 
Product Size Risks: 
The following risk item issues identify some generic risks associated with product size: 
1. Estimated size of the product and confidence in estimated size?  
2. Estimated size of product?  
3. Size of database created or used by the product?  
4. Number of users of the product?  
5. Number of projected changes to the requirements for the product? 
Risk will be high, when a large deviation occurs between expected values and the previous experience. All the expected information must be compared to previous experience for analysis of risk. 
Business Impact Risks: 
The following risk item issues identify some generic risks associated with business impact: 
1. Affect of this product on company revenue?  
2. Reasonableness of delivery deadline?  
3. Number of customers who will use this product and the consistency of their needs relative to the product?  
4. Number of other products/systems with which this product must be interoperable?  
5. Amount and quality of product documentation that must be produced and delivered to the customer?  
6. Costs associated with late delivery or a defective product? 

Customer-Related Risks: 
Different Customers have different needs. Customers have different personalities. Some customers accept what is delivered and some others complain about the quality of the product. In some other cases, customers may have very good association with the product and the producer and some other customers may not know. A bad customer represents a significant threat to the project plan and a substantial risk for the project manager. 
The following risk item checklist identifies generic risks associated with different customers: 
1. Have you worked with the customer in the past?  
2. Does the customer have a solid idea of what is required?  
3. Will the customer agree to spend time in formal requirements gathering meetings to identify project scope?  
4. Is the customer willing to participate in reviews?  
5. Is the customer technically sophisticated in the product area?  
6. Does the customer understand the software engineering process? 
Process Risks: 
If the software engineering process is ill-defined or if analysis, design and testing are not conducted in a planned fashion, then risks are high for the product. 
1. Has your organization developed a written description of the software process to be used on this project?  
2. Are the team members following the software process as it is documented?  
3. Are the third party coders following a specific software process and is there any procedure for tracking the performance of them?  
4. Are formal technical reviews are done regularly at both development and testing teams?  
5. Are the results of each formal technical review documented, including defects found and resources used?  
6. Is configuration management used to maintain consistency among system/software requirements, design, code, and test cases?  
7. Is a mechanism used for controlling changes to customer requirements that impact the software? 
Technical Issues: 
1. Are specific methods used for software analysis?  
2. Are specific conventions for code documentation defined and used?  
3. Are any specific methods used for test case design?  
4. Are software tools used to support planning and tracking activities?  
5. Are configuration management software tools used to control and track change activity throughout the software process?  
6. Are tools used to create software prototypes?  
7. Are software tools used to support the testing process?  
8. Are software tools used to support the production and management of documentation?  
9. Are quality metrics collected for all software projects?  
10. Are productivity metrics collected for all software projects? 
Technology Risk: 
1. Is the technology to be built new to your organization?  
2. Does the software interface with new hardware configurations?  
3. Does the software to be built interface with a database system whose function and performance have not been proven in this application area?  
4. Is a specialized user interface demanded by product requirements?  
5. Do requirements demand the use of new analysis, design or testing methods?  
6. Do requirements put excessive performance constraints on the product
Development Environment Risks: 
1. Is a software project and process management tool available?  
2. Are tools for analysis and design available?  
3. Do analysis and design tools deliver methods that are appropriate for the product to be built?  
4. Are compilers or code generators available and appropriate for the product to be built?  
5. Are testing tools available and appropriate for the product to be built?  
6. Are software configuration 


Post a comment

Who ever writes Inappropriate/Vulgar comments to context, generally want to be anonymous …So I hope U r not the one like that?
For lazy logs u can at least use Name/URL option which don’t even require any sign-in, good thing is that it can accept your lovely nick name also and URL is not mandatory too.
Thanks for your patience
~Best job portal admin(I love "Transparency")