The roles and responsibilities for risk management

Assignment Help Basic Computer Science
Reference no: EM132376950

You are the new IT Project Manager for the organization you chose in Week 1, and the CFO is needing a risk assessment for migrating from SQL Server 2008 r2®?database to SQL Server 2016. The migration will lead to the expansion of the Cloud Datacenters worldwide.

The CIO feels the risk is too high and wants you to develop an Information Guide Handout and Risk Information Sheet for upper management to describe the risks and management of the risks for the impending migration.

Part A:

Create?a 1- page Information Guide Handout to present to upper management comparing risk management practices to use in the migration that includes:

How risk mitigation strategy planning can reduce the likelihood and/or impact of risks

How often risks will be reviewed, the process for review, and who will be involved

The roles and responsibilities for risk management

Adequate references to support your findings, information, and opinions

A recommendation for the best risk management practice for this migration

Part B:

Using?the sample shown below, create a 4- to 5- page Microsoft® Excel® Risk Information Sheet for at least five potential risks which might be encountered during the conversion. At least three of the five risks you choose should be project-management related.

Risk Information Sheet

Risk Description

Probability

Impact

Rationale

Risk Mitigation

Details/Outcome

Please?note?the following:

The risk description should fully describe the risk.

The probability is the likelihood which the risk will occur (i.e., low, medium, or high).

The impact is how the organization will be affected if the risk does occur (i.e., low, medium, or high).

The rationale should explain the reasons for your probability and impact assessments.

The mitigation strategy should explain how each risk will be addressed.

There should be one risk information sheet for each risk identified.

Include APA-formatted citations when necessary.

Reference no: EM132376950

Questions Cloud

Security policies are maintained to avoid security breach : Assume that you are the Security administrator in your organization. How can you ensure that the security policies are maintained to avoid security Breach?
Anyone can explain what is effective communication : Anyone can explain what is effective communication? Please list the three main types of communication skills.
Identify all the cultural and social norms in south korea : 1. Identify all the cultural and social norms in South Korea when it comes to gender, both in workplace and outside of work place.
Financial accounting standards board problem : Financial Accounting Standards Board assignment help and solutions, assessment help - Analyze the Financial Accounting Standards Board (FASB) conceptual.
The roles and responsibilities for risk management : How risk mitigation strategy planning can reduce the likelihood and/or impact of risks. The roles and responsibilities for risk management
Terms of promoted videos in searches : Do you ever fail to come up with videos? What do you see in terms of promoted videos in these searches?
Organizational affilate managed by stockholder or stakeholde : Please help me answer these questions? Does your current work, school, or organizational affilate managed by stockholder or stakeholde
Emerging threats- prevent the cyber attack : Discuss what type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring in the future.
BBS301 Applying Mixed Method Research to Business Assessment : BBS301 Applying Mixed Methods Research to Business Assignment help and solution Murdoch University - consultancy project is made up of six phases.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What risk assessment method

What risk assessment method (i.e., qualitative or quantitative) would you choose for starting new e commerce website

  Located next to a fabric manufacturer

A charcoal manufacturer (C) is located next to a fabric manufacturer (F). F produces fabric that is used to make white bed sheets.

  Define the different end conditions for cubic spline

Define the different end conditions for cubic spline interpolation, giving rise to the natural, complete, and not-a-knot variants. Which of these is most suitable for general purpose implementation, and why?

  Break down complex algorithms before coding

Pseudo code is a great way to break down complex algorithms before coding. It in my opinion is much better and faster than drawing a flowchart.

  Write a constraint for policy using pandey

The method willaccept returns 1 if the named process will accept messages, and 0 otherwise. Write a constraint for this policy using Pandey and Hashii's policy constraint language as described in the first example in Section 4.5.1.

  Find the largest key in a binary search tree

Write an algorith m that finds the largest key in a binary search tree. Analyze your algorithm, and show the results using order notation.

  Declaration and compile-time initialization foran identifier

Which of the following would be the best declaration and compile-time initialization foran identifier to store the cost of tuition this year if the value is $10,000?decimal tuitionCost =$10,000.00;decimal tuitionCost =10000.00m;decimal tuitionCost..

  Combating proliferation of drugs

Explain how you would use data available to you to prepare a report for the Governor for the State Program "Combating Proliferation of Drugs."

  Draw a straight line demand curve show

Draw a straight line demand curve show where it is unit elastic, inelastic and elastic.

  Demonstrate your program to me in class to receive credit

The program must be written in Java. Upload the completed program source code to D2L. You will need to demonstrate your program to me in class to receive credit.

  Find the cheapest path from a to b and its time complexity

Now suppose that both the edge and vertex costs are not constant (but are all positive). Give an efficient algorithm to find the cheapest path from a to b and its time complexity

  Determine the phone numbers and contacts of all bobcrypt

Explain why this scheme does not achieve the intended security goal. How can Bob act maliciously to determine the phone numbers and contacts of all BobCrypt use

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd