Free Essay

Risk Paper

In:

Submitted By KCarter0408
Words 2932
Pages 12
Introduction
The purpose of this plan is to communicate what steps and procedures would be taken if PSTW Bank customers’ personal information was leaked to the public. PSTW Bank has established this plan to address the immediate requirements for a technological crisis. This plan includes potential crises, key contacts of the crisis management team, the operations center, key audiences, media awareness, and post crisis planning and evaluation. There are also two documents, one document will address the press and one document will address the public. Customers expect their information to be safe and secure once it enters PSTW’s databases, and PSTW is dedicated to keeping it that way. With identity theft on the rise, people are very cautious with who they give their information to. Sony’s PlayStation Network was recently hacked which lead to the leak of millions of customers’ personal account information, credit card numbers, etc. Companies now have to increase their security to make sure the same thing does not happen to them.
Potential Crises
There are a number of potential technological crises that can occur. The first potential crisis is a hacker that hacks into the databases that store personal information of PSTW’s customers. This information includes full names and addresses, social security numbers, etc. This is all information that would allow identity theft to occur. Not only can the information be hacked, but the hacker can also release the information to the public. This would greatly increase the potential for identity theft to occur, since the public has the information. If these crises occurred, customers would no longer trust PSTW with their information and would do business with other companies. In turn, this would lead to a financial crisis within PSTW. PSTW has not previously faced any crises but must prepare for the worst.
Contacts
The single most effective way of dealing with a crisis situation, or a critical incident of a leak in the system is to utilize the Emergency Response Management Team (ERM) and assign them to their position throughout this time the system has a break in the secured system. The ERM is an organized group created to assist the planning for and responding to emergencies of the PSTW bank.
The members are trained in the implementation crisis management plan. These members will be the direct contact and have designated rolls within the organization. Members that are contacted in the sequence of order are as follows: Cynthia Thomas, Tammera Shinar, and Sharon Travis. These are the key people who are designated to specific roles in the PSTW network. Cynthia will be responsible implementing the chain of command by notifying the FBI as well as the FDIC about the infiltration of the PSTW’s secured system. All entities will be contacted to take control of their current department to disseminate all available information. The notification starts with the chief information officer, and ends with all the emergency response leaders. The sequence of events will not be aborted until all information is secured and virtually untouchable to any further unauthorized users. Full cooperation is expected from all of the crisis management team to help. Once all information is accounted for Cynthia will contact all the ERM to help restore the accounts affected by the infiltration. At that point Tammera will need to promote some damage control along with James and Sharon to report the positive outcomes reflected by the appropriate use of the CMT and its effectiveness to help abort any further damage from occurring.

Operations Center
PSTW’s network operation center is location on the third floor at our Corporate headquarter in Downtown Cleveland, Ohio. The operational center is equipped with fifteen highly skillful employees, all facing a video wall, which typically shows details of highly significant alarms, ongoing incidents and general network performance. In addition there is a wall used for showing a news or weather TV channel, so the technicians can be aware of current events which may have an impact on the systems. The technicians are responsible for monitoring the network for certain conditions that may require special attention to avoid impact on the network's performance. They monitor power failures, customers’ personal information, employees’ personal information and other performance issues that may affect the network. The operational center employees’ analysis problems, perform troubleshooting, communicate with site technicians and other, and track problems 24/7. The Operational Center Manager alerts the CIO, the CIO would alert upper management and upper management would alert branch managers when the system has been breech.
PSTW uses a "Virtual EOC". Virtual EOC is a concept wherein command center participants can share information, make decisions, and deploy resources without the requirement to be physically present in the command center. Typically using web-enabled software, a Virtual Command Center allows participants to work from their normal workstation, from home, or from the field. Emergency plans and reports are available from any location. In fact, all information can be maintained in a central database that is available to command center participants from anywhere in the world (DavisLogicInc, 2012).
After an emergency is declared, the Emergency Response Management Team initially meets in the Emergency Operations Control Center to be briefed on the emergency. The Emergency Response Management Team is responsible for creating the overall plan of action for each specific emergency. The implementation of the overall plan is managed and coordinated by the Emergency Coordinator. The Operational Center consists of several members:
 Cynthia Thomas, The Chief Information Officer
 Tammera Shinar, Manager
 Sharon Travis, Emergency Coordinator
 James People, Alternate Emergency Coordinator
 Martin Smiley, Off-site Emergency Coordinator
 Crystal Swiecicki and Angela Wesley are part of the Emergency Response Team Leaders.
Key Audiences
The key stakeholders of PSTW include our customers, victims, employees, our business, hackers, and LifeLock. If our database becomes compromised we have to react quickly to rectify the issue. Our customers will be looking for communication on the infiltration, what we are doing to fix the issue, what we are doing to protect their information in the future, and if they were the victim what assistance is available.
The best way to communicate to our customers is through a letter and email with a phone number to call for further information. Within this letter we would provide information and protective steps offering free credit reports for a year and credit monitoring for the victims. We would also offer 6 months of LifeLock with an offer to purchase at a discounted price within 180 days of the letter.
The company website would also have protective measures that PSTW is taking and also for the customer. This would also be a great way to let the customers know of the business partnership with LifeLock, who will protect the customer’s information and also prove to the customer that PSTW is looking out for them and their business.
TV and Radio would not be the best way to communication to the stakeholders, but within six (6) months PSTW would run ads on how they have recovered from the infiltration and how business is booming because of the partnership. This would also be a great way to let the customers and hackers know that PSTW is a “Say NO to Identity Theft”.
Media Awareness
Should PSTW Bank of America experience an information leakage crisis the organizations leader will contact Tammera Shinar whom is the designated spokesperson for PSTW. Tammera will contact a media representative to set up a media press conference within the first two hours of receipt of verified facts and details associated with the information that has been leaked. Every effort will be made to avoid misrepresentation, misunderstanding or confusion that may result from the use of media. The media press conference will be used to educate the public on the following concerns:
• What type of information has been leaked
• Who is affected (i.e. cities, branch locations)
• What we are doing to resolve the crisis
• What resources we have in place to address the issue
• How we will prevent similar incidents from occurring in the future
James People will be the designee in the facilitation and the flow of information. James will work alongside Tammera to ensure ongoing communication with reporters, news stations, and through radio feed. Once the media press conference had been conducted, the crisis team will monitor all sources of news coverage and immediately address any errors or misrepresentation that might be made.
Media inquiries will be handled through our crisis communication team at our media center. We will assign communicators to handle incoming calls and maintain a log to record all calls and interviews that are requested by the media. The crisis communication team will respond to all requests within a 2 hour time frame. PSTW will also address the public through web response. PSTW’s web programmer will update their website with a link that has posted FAQ’s regarding the information that has been leaked. Additionally, it will provide a list of contacts for the public and the media to address their concerns or questions.
Members of the crisis communication team with work closely with media representatives to help facilitate and control the information that is being released in the media.
Members of the crisis communication team:
• Tammera Shinar, Spokesperson for PSTW Bank of America
P: 1-866-123-4567 tshinar@pstw.com
• Cynthia Thomas, Manager of Command Center
P: 1-866-123-4568 cthomas@pstw.com
• James People, Associate Director of News and Public Information
P: 1-866-123-4569 jpeople@pstw.com
• Sharon Travis, News Writer and Editor
P: 1-866-123-4566 stravis@pstw.com

Post-Crisis Planning and Evaluation
The ERM will secure all documents and electronic data related to the incident. They will be filed systematically and stored in a central location. All duplicates should be destroyed to avoid leakage and inconsistency at a later in time. PSTW bank will be provided with a written report with in twenty- four hours. A review of the risk analysis with ERM will be necessary to explore new avenues in crisis prevention with immediate implementation. This report will be shared with all the ERM staff so the stakeholders can be reassured it was a one-time occurrence.
Tammera will handle the press and identify what happened and the measures taken to abort any further leaks and the success of such a quick response. A thorough operational debrief is necessary for crisis managers and incident victims. Damage control of the stakeholders and employees must set precedence on our quick response (Coakley, 2011). This facilitates proper analysis of the incident and a review of quality in the crisis management; this identifies PSTW fostering good crisis planning. Debriefing should be well-documented, and lessons learned should feed into a review of crisis response planning (Coakley, 2011).
James will work with the PSTW bank by making the appropriate provisions for the extension of gratitude. This must include all team members who helped resolve the incident. Security threats will always be there but by moving forward with new strategies we can provide security of our system and regain the trust of the stakeholders.

Document 1: Internal Company Memorandum
In order for our company to maintain its legitimacy with our investors, employees and customers, it is necessary that we, as a family institution protect all parties from fraud and identity theft. We can accomplish this through a combined effort of vigilance and determination. As a team we are strong. The following actions are effective immediately.
A. Safeguard procedures. All personnel will employ the following procedures to ensure the proper handling of Privacy Act information.
(1) Full social security numbers (SSN) shall not be included as part of any printed personnel reports, correspondence, or local forms, etc., unless specifically required. The only authorized SSN derivative that may be used is the last four digits.
(2) All personnel will adhere to the "no disclosure without consent of the record subject" rule of the Privacy Act and ensure that any "non-consensual" disclosure complies with the specific exception criteria set forth in the Privacy Act system of records notice governing records collection. Further, personnel will also ensure that all personnel requesting access to Privacy Act data have demonstrated a valid "official need to know in order to conduct agency business" before such information is shared.
(3) All personnel are required to password-protect Privacy Act data maintained on network shared drives.
(4) In no case is it ever permissible to post Privacy Act data to publicly accessible web sites.
(5) Data files containing Privacy Act data requiring movement from one system to another through or across the company network shall be encrypted, password protected and transported using secure file transfer protocol (FTP) or virtual private network (VPN).
(6) Privacy Act data will not be stored on a removable storage device, thumb drive, floppy, cd-rom, dvd or laptop unless encrypted and password protected.
(7) Privacy Act data will not be maintained on personal computers/devices.
(8) Documents containing Privacy Act information will be marked “For Official Use Only” and shredded when no longer required.
(9) All personnel who handle Privacy Act data must complete Privacy Act training prior to gaining access to Privacy Act records.
A. Transporting Privacy Act Material
(1) All personnel tasked with transporting records containing Privacy Act data will transport data in a manner that prevents disclosure of the contents.
(2) A cover sheet stating "For Official Use Only" must be used on all documents containing Privacy Act data. Remember, we are here to serve each other and support not only the institution, but we have a responsibility to protect all of our families from outside threats. Document # 2
If a breach of security happened at PSTW the CEO of our organization would address the local media outlets as while as national outlets like HLN and CNN. There will also be letters send to our customers and clients explaining the situation and corrective actions. The CEO would conduct a televised press conference as followed.
“As you all know PSTW is one of the most reliable and trustworthy organizations in the country. However, the same cannot be said of all of our citizens here or aboard. With that being said, I am here to announce to everyone that there has been a breach in our security systems and our customers are at risk. We have taken extreme and corrective measures to insure that this violation will never happen again. Immediately after discovering the infringement, PSTW assembled an Emergency Response Management Team to investigate this rupture in our security systems. We have technical experts tracking the hackers working alongside the local authorities in Cleveland and the FBI. We also contacted the major credit rating agencies (Equifax, TransUnion, and Experian) so that they can notify PSTW or law enforcement of any and all activities, at our expense. We made a promise to protect our customers and clients and we will keep that promise by bringing the individuals responsible to justice. For the customers that are impacted by this situation we advise them to take preventative actions as well because this will help reduce the possibility of criminals using their information.
Furthermore, all PSTW accounts, web usage, and other transactions have been temporarily suspended until counteractive measures are complete per our company protocol. We truly apologize for any convenience. Company is taken every step to ensure our customer information is secured. If you have any concerns you may contact, Emergency Command Center P: 1-866-123-4568. We are here to answer questions or address any concern you may have 24/7. Sincerely Yours,
PSTW Bank
Conclusion
Rapid technological changes, the rapid growth of the Internet and electronic commerce, and the development of more sophisticated methods of collecting, analyzing, and using personal information have made Identify leak an issue and concerns. Hackers are using sophisticated technology to breach secured system to obtain personal information. Our company is the gate keeper of sensitive personal information about customers and employees. Therefore it is our duty and responsibility to safeguard our customers and employees personal information at all cost. PTSW have a sound security plan in place to help us in the event that our system is breach. PTSW have develop mechanisms that protect information security and data integrity, and to enforce company privacy policies. In the event of a breach we have an Emergency Response Team that will identified the problems and resolve it quickly, to ensure our customers and employees privacy and security will not be compromise.

References
Coakley, M. (2011). Attorney General, Retrieved February 9, 2012 from Website:http://www.mass.gov/ago/consumer-resources/consumer-information/scams-and- identity-theft/security-breaches.html
Crews, C.W., & Oberwetter, B. (2006). Preventing identity theft and data security breaches. Retrieved February 11, 2012 from Website: http://cei.org/pdf/5316.pdf
Davis Logic Inc. (2012). Virtual Emergency Operations Centers. Retrieve February 4, 2012 from Website: http://www.davislogic.com/command.htm#Virtual.
Locklock (2012) Retrieve, February 9, 2012 from Website: http://www.lifelock.com/.
Peoples, J. (2012). Completed Document 1. MBA student at Keller Graduate School of Management.
Shine, T. (2012). Completed Media Awareness. MBA student at Keller Graduate School of Management.
Smiley, M. (2012). Completed Document # 2. MBA student at Keller Graduate School of Management.
Swiecicki, C. (2012). Completed introduction and potential crises. MBA student at Keller Graduate School of Management.
Thomas, C. (2012).Completed contacts and post-crisis planning and evaluation. MSN student at Chamberlain College of Nursing.
Travis, S. (2012). Completed operational center and conclusion. MBA student at Keller Graduate School of Management
Wesley, A. (2012). Completed key audience. MBA student at Keller Graduate School of Management.

Similar Documents

Premium Essay

Risk Paper

...Risk Paper 1 Pm595 Risk Paper: Buying a new house Project Risk Management Professor:  James Reckon By Magued Farag May 24, 2014 TITLE: BUYING A NEW HOUSE TABLE OF CONTENTS INTRODUCTION RISKS IDENTIFICATION RISKS RANKING MATRIX RISKS MONITORING CONCLUSION REFERENCES * INTRODUCTION Whenever considering a major purchase in life one must carefully consider the risks associated with making these purchase decisions. These decisions should be treated as projects in such a way that proper planning, analysis, risk assessment and contingency should all be aspects of the purchase process whether formal or informal. In this paper, I will discuss about a project that many people are familiar to: buying a new house. Few years ago, I moved to a new area and was trying to decide whether or not to purchase a new house, and if so, where should I buy it. I also considered if I should buy a preexisting new house or hire a builder for a new house. Every option had its own set of potential risks. If I continued to rent, was this really just throwing away money. If I purchased a house, could I afford it and was I buying the best house for me and my family? I approached it like any other project, with interviewing people, note collecting, collating, and interpreting the data. After reviewing my expenses and income and examining the tax advantages, I decided to buy a house but knowing that several risks may accompany my decisions, these risks rank from high probability...

Words: 1494 - Pages: 6

Premium Essay

Risk Paper

...Farah Allen Risk Paper #2 2/24/13 This case study evaluates the approach used in the evaluation of tender submissions. The application is used successfully for large high technology procurements. It is basically a two part process or two phase system. In Phase I, the goal is to establish a risk baseline that individual tender responses can be compared to. Phase 2 builds on Phase 1 where the goal is to compare the individual tender’s approach to the potential effects of risk on the project. The two phase process is a systematic process which helps to ensure the greatest attention and effort is focused on the high risk areas for the project. 1. Which case study does a better job at identifying risks? Explain why.  Phase 1 and Phase II use the same process for identifying risk; therefore there is an equal level of performance. Determining which case study does a better job of identifying risks is made much easier by applying the definition. “Risk identification determines what might happen that could affect the objectives of the project, and how those things might happen.” The process should be comprehensive to ensure all key elements have been identified. The preferred method for risk identification is brainstorming. In Phase I and II the project team uses a risk WBS as noted in figure13.2 for Phase I and figure 13.11 in the text. The risk WBS was developed using brainstorming as discussed in Chapter 2, and each risk WBS item is reviewed. Any required clarification is...

Words: 974 - Pages: 4

Premium Essay

Risk Paper

...Risk Paper #2 Case Study – Tender Evaluation Marjorie Spitz Keller Graduate School of Management PROJ 595- Project Risk Management Instructor: Professor Bill Lewis Week 7 Date: April 20, 2013 Introduction In a tender evaluation process, it is vital to identify, assess and quantify risks that might be associated with the tender. According to Cooper, Grey, Raymond and Walker (2005), risk management is vital in the tender evaluation process, because risks associated with specific tender responses are identified at an early stage, so they can be addressed explicitly in the tender evaluation. The high-risk areas on which the greatest attention and effort should be focused in the evaluation of tender responses are identified. (Managing Risk in Large Projects and Complex Procurements.Ch.13, pg 148). The goal of this paper is to compare and contrast the two phases of the case study Tender Evaluation. “Phase 1 is concerned with establishing a baseline against which tenders can be assessed, prior to bids being received. Phase 2 compares each submitted tender offer with the baseline, to develop a comparative risk assessment for each one.”(Cooper, Grey, Raymond and Walker, 2005). Both phases are important in order to understand the risks during the tender evaluation process. ...

Words: 1127 - Pages: 5

Premium Essay

Risk Paper

...of the joint Medical Mart-Cleveland Convention Center is well underway on the historic Mall. It is the goal of the project to capitalize on Cleveland's reputation as a world class medical center by bringing medical shows and conventions to the city. The Medical Mart concept is modeled after that of the Merchandise Mart in Chicago, and will be managed by MMPI, the same company that operates the Merchandise Mart and will open in 2013(About Cleveland MMCC , 2011). This paper will discuss how risks were identified, ranked, and monitored for the Cleveland Medical Mart project. Identifying Risk Risk management is the identification, assessment, and prioritization risk in a project. It attempts to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities. Risks can come from uncertainty in financial markets, project failures, at any phase in design, development, production, or sustainment life-cycles, legal liabilities, credit risk, accidents, natural causes and disasters as well as deliberate attack...

Words: 945 - Pages: 4

Premium Essay

Risk Assessment Paper

...Risk Assessment Paper CMGT 579 September 26, 2011 Kyrstal Hall Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011). A Risk Assessment is periodic assessment of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization. A risk assessment should include a consideration of the major factors in risk management: the value of the system or application, threats, vulnerabilities, and the effectiveness of current or proposed safeguards. Many organizations perform risk assessments to measure the amount of risks that could affect their organization, and identify ways to minimize these risks before a major disaster occurs. Department of Defense Information Systems Agency (DISA) follows guidelines and policies governed by processes by which the organization assesses and manages exposure to risks. In this paper the subject to identify...

Words: 1263 - Pages: 6

Premium Essay

Risk Memorandum Paper

...Risk Memorandum to the Chief Information Security Officer of Anthe Inc. By Sravani Nandyala Submitted to Prof. Mr. Jason Black Northeastern University- College of Professional Studies March 15, 15 Memo To: Jason Black, Chief Information Security Manager From: Sravani Nandyala Date: March 14th, 2015 Subject: Acceptance Review Process Introduction I would like to propose the risk memorandum for the acceptance review process of Anthem Inc. which is an insurance corporation. Anthem is one of the second largest Insurance Company in United States of America. The goal of this formal acceptance review process is to setup the risk quality measures and risk tools wherein all the employees need to accept and follow the prescribed rules...

Words: 589 - Pages: 3

Premium Essay

Risk Management Paper

...Risk Analysis Register for Revedo Manufacturing Inc. By: Kayode Y. Tomoloju Course: Risk management/JIT 2 Task A Western Governors University Course Mentor: Susan Skinner March 3, 2015 Creating Risk Register for Revedo Manufacturing Inc. Risk | Description | Owner | Source | Likelihood of Occurrence* | Severity of Impact* | Controllability* | Risk OneEarthquake Due to the frequency of occurrence of earthquake in California and China, the China plant of Revedo Manufacturing Inc. could witness such disaster. – Global Risk | Chances are that earthquake could occur in China location of Revedo Manufacturing Inc. plant. This type of natural disaster is uncontrollable and will of course affect productivity and projected profit of the organization. | The entire organization stakeholders.Management, employees, trade contractors, customers, environmental group and localResident. | ( See explanation below) | HighEven though Earthquake often occurs in China, The likelihood of occurrence in in China plant is remains at medium. This is because there is historical fact that it has severe impact in the area the plant is located. | HighThe effect of EarthquakeThe companyOffice in San Jose And ChinaIs absolutelyA high severity.This is because properties will be lost,Production Will be affected, data will be destroyed and this act will definitely Lead to loss of Revenue. | HighBack up technologicaltools in remote location. Put in place effective disaster recovery program...

Words: 2141 - Pages: 9

Free Essay

The Risk Management Paper

...In organizations risk management is a necessary tool that is helpful, to secure the company to stay in top financial shape. When using risk management is vital with promises that security also governs spending are fair, with the risks that come with it to which the companies are exposed. Subsequent an inclusive, also proper risk management method needed the clear understanding of values with danger in the matter. The danger is further than inquiries, with effectiveness, also the method with it. In this paper, it will talk about the part and nature of authoritative risk management in justice and security associations why it is essential. Getting ready for threats and distinguishing assets, the reason justice also security associations deal with risk, expenditure connected with overseeing risk, penalties for not supervising the risk, Benefits also accurately performed risk analysis has for management and key partners, also the conclusion. Therefore, the reader can have an in-depth, understanding of the security and criminal justice organizations. Role and nature of organizational risk management Risk management considered one, of the best assets that an organization could have. They make sure the business is financial safeguarded when finding different business endeavors they interested in investing into to broadening their company enterprise. “The Risk Management Function has been regarded as an advisory function for senior management rather than a...

Words: 2227 - Pages: 9

Premium Essay

Home Buying Risk Paper

...Risk Paper 1 Risks Involved During The Purchase Of Our Home 1/25/2015 Class: Proj-595 Professor: Dr Madireddy [Type the author name]   • INTRODUCTION In the spring of 2013 my family embarked on a new adventure. We moved 2800 miles from San Diego CA. to Franklinton NC. because of a promotion I accepted with my company. This was a very exciting and frightening time of transition for my family. There were many changes we had to make as well as some very important decisions to make. The biggest decision and question we had to make and answerer was are we going to buy a home or are we going to rent? Once the decision was made we were going to buy a home many questions and decisions had to be made and many risks had to be addressed. The risks we had to address when looking at purchasing a home include financial risks and environmental risks. • RISKS INVOVLED DURRING THE PURCHASE OF OUR HOME Home buying is a very exciting experience. Whether you are a first-time buyer or an experienced owner, buying a house requires a "preflight check," in the words of Barry Zigas, director of housing policy for the Consumer Federation of America. (Dratch) Before doing any risks assessments we first had to put down the home purchase into a pros and cons diagram to see if this was something we were willing to take on. With that decided we then proceeded to look at the risks involved. As my family experienced and statistics have shown that owning a home is not...

Words: 683 - Pages: 3

Premium Essay

Purchasing a House Risk Paper

...Running head: PURCHASING A HOUSE RISK PAPER Purchasing a House Risk Paper Keller Graduate School of Management Project Risk Management PROJ 595 Dr. Susan Orr August 04, 2013 Purchasing a House Risk Paper INTRODUCTION The many advantages to owning a home have been well publicized. However, the above satistics make it clear that owning a home is not without risk. To form a complete picture, you, the prospective buyer, need to consider the potential risks and disadvantages of home ownership as well. Understanding these disadvantages beforehand will give you a better chance of minimizing their impact and avoiding the fate suffered by these homeowners. RISKS IDENTIFICATION There are many risks in buying a new house such as: • The opportunity cost of investing in an alternative investment is very high because the entire cash and future income stream is tied up into one asset a home, which may or may not appreciate. • The house is an undiversified investment, so if the market tanks as it has, game over. • Knowing that we do not own our home, the bank does. • A lot of cost connected to home ownership, such as repairs and insurance and fees and potential hazards I have not considered. • If I lose my job, game over, this will put a lot of stress on me. • There is a chance that your new home will lose value. Luckily, in general, the longer you own your home, the less likely a loss becomes. Loss of value is typically a short-term problem, possibly due to the local...

Words: 1117 - Pages: 5

Premium Essay

Proj545: Risk Paper #1

...Proj545 Professor: James Jameson May 21, 2015 PROJ545: Risk Paper #1 Risk Paper   Introduction A few years ago I received some advice from my brother who at the time was a rather successful real-estate agent and previous real estate appraiser. He had built some wealth not only buy and selling houses for clients but also managed to purchase a few properties as personal investments. The advice I received was I should look at investing in real-estate. “You can look to me for guidance, I will not only make sure the property you choose makes sense on paper but I can also guide you through the renovation/remodeling process.” My family was no stranger to real-estate investment. My parents had for a long time been landlords and had purchased a few properties, renovated them churned a profit at the time of sale. After a few years of receiving continued encouragement from my family to invest, I finally made the decision to make my first big purchase. I was never a fan of taking big risks but as I watched my family succeed in real-estate and did put my mind at ease. I was not naïve of the inherent risks and I did consider obstacles that I could face and or threaten my investment. Identifying Risks After making the decision to attempt my luck at real-estate, I started to gather ideas on what potential risks I would be most affected by. My main sources of risk identification was braining storming and interviews with what were my “mentors” although they were family...

Words: 861 - Pages: 4

Premium Essay

Pm595 - Risk Paper #1

...Risk Paper #1 – New Vehicle Purchase Risk Assessment Introduction Whenever considering a major purchase in life one must carefully consider the risks associated with making these purchase decisions. These decisions should be treated as projects in such a way that proper planning, analysis, risk assessment and contingency should all be aspects of the purchase process whether formal or informal. Purchasing a new vehicle, like so many other major purchases (likely the second largest purchase one may make in their lives behind purchasing a new home), is no exception. Several risks accompany these decisions, these risks rank from high probability – high risk to low probability – negligible risk. Analysis Many factors contribute to the frequency and likelihood of risks as well as the severity of these risks. When considering purchasing a new vehicle careful consideration must be taken before signing a contract and driving the vehicle off of the lot. Each buyer will undoubtedly rank these risks differently; however the following analysis represents how one individual may assess these risks. Risk 1 – Needs Family and career needs are typically a high priority not only when purchasing a new vehicle, but also when considering the necessity of a new vehicle. Possibly one’s family is growing and the two seat sports car just will not cut it anymore. When considering a new vehicle this is often a priority for young families and must be considered as a high priority risk, making sure...

Words: 849 - Pages: 4

Premium Essay

Country Risk and Strategic Planning Analysis Paper

...Country Risk and Strategic Planning Analysis Paper University of Phoenix MGT/448 Kathryn Hayman December 19, 2011 Team C has decided to conduct a country risk analysis for the country of Mexico. The selected business venture is about laptop computers. When it comes to global business ventures there also comes a great amount of risks. In the following paragraphs is an analysis of the following risks; political, legal, and regulatory risks, exchange and repatriation of funds risks, competitive risk assessment, taxation and double taxation risks, market risks, distribution and supply chain risks, physical and environmental challenges to entering and operating in a target market, social and cultural risks, and cyber or technology risks. A description of how these risks would be managed and a summary of the strategic planning process will be explained. Mexico has a moderate political risk according to AM Bests Country risk report. Mexico ties with large, developed countries that are very strong has help them in this aspect when it comes to their political risk. NAFTA North American Fair Trade Agreement also helps in this respect since it is now one of the largest free trade areas. This agreement was established between the Unites States, Canada, and Mexico and became effective on January 1, 1994. This alliance has brought economic growth and rising standards to the citizens of these three countries. There are many advantages of NAFTA, being that it has created...

Words: 780 - Pages: 4

Premium Essay

Security Risk Management Course Paper

...protection of the hardware that runs the information system. Therefore, a proper understanding of risk management and all that it entails is of the utmost importance for every IT professional, regardless of specialization. The purpose of this paper is to identify what risk management is and give an overview of the three phases or undertakings that make up the risk management process and then conclude with a discussion and explanation of the six-step Risk Management Framework (RMF) developed by the Department of Defense and the National Institute of Standards and Technology (NIST) (National Institute of Standards and Technology, 2010). “Risk management is the process of Identifying risks, as represented by vulnerabilities, to an organization’s information assets and infrastructure, and taking steps to reduce this risk to an acceptable level” (Michael E. Whitman, Herbert J. Mattord, 2012, p. 119.). Thus, risk management is merely the ability of a person or organization to implement due diligence and identify any potential issue and develop policies and security measures to combat these risks. Risk management is comprised of three phases: risk identification, risk assessment, and risk control (Michael E. Whitman, Herbert J. Mattord, 2012, p. 119.). Risk Identification Risk identification is simply the identification and documentation of the assets and the threats to those assets. Risk identification is an...

Words: 2778 - Pages: 12

Premium Essay

Proj 595 Risk Paper #2

...Risk Paper #1 – Vehicle Purchase Risk Assessment PROJ 595 – Project Risk Management Introduction Major life decisions should never be taken lightly. The only major life decision that I have ever made was buying my first car. When it comes to buying a car there are always a slew of risks that come with it. There were many things to consider here before even going out to visit the dealerships. First would I buy the car new, if so which car maker would I go with, each car maker has their own risks that come with buying their car. Or would I go the used route and tackle all the risks that come with buying a used car. I also needed to consider which route would be cheaper for me in the long run. In the end I ended up buying a new car despite the known risks and the sneaky unknown risks that snuck up on me. Risk 1 – Insurance One the biggest risk that people should look at when buying new, which I unfortunately did not do, is to see how much of an increase it will add to your insurance. Before buying my new car, my car insurance was in the mid hundreds. It was fine because I received my previous car as a hand me down and I did not have to make car payments. But, after everything was said and done and I got the new car I went to the insurance agency to update to my car insurance. To my surprise, the monthly car insurance jumped up nearly an extra two hundred. There were many reasons why, but one of the big reasons for the increase was the fact that 2012 models added a major...

Words: 978 - Pages: 4