Software Engineering Notes - 5 - 1713175990336
Software Engineering Notes - 5 - 1713175990336
Software Engineering Notes - 5 - 1713175990336
Management
Unit 5
5.1 Risk Management:
Software Risks,
Risk Identification,
Risk Projection,
Risk Refinement,
These risks stem from a variety of sources, including financial uncertainties, legal liabilities,
Ans
With every step that your organization takes to enhance your digital transformation
The more open your business is, the more are enterprise risks involved. Businesses
frequently run the danger of data breaches, technological failures, virus attacks, and
cyberattacks.
IT Risk management
The process of identifying, evaluating, and controlling risks to an
organization’s resources and profits is known as risk management. These
dangers can be caused by a number of things, such as monetary
unpredictability, legal responsibilities, technological problems, strategic
management blunders, accidents, and natural calamities.
Risk is an expectation of loss, a potential problem that may or may not occur in
software risk
What Is Software Risk And Software Risk
Management?
Software risk exists because the future is uncertain and there are many
known and unknown things that cannot be incorporated in the project plan.
What are the different type of sw Risk
(a) internal risks that are within the control of the project manager
(2) external risks that are beyond the control of project manager
what is Risk Identification?
Risk identification (RI) is a set of activities that detect, describe and catalog all
potential risks to assets and processes that could have negatively impact business
It acts as input for actual risk analysis of the relevant risks to an organization.
what is Risk Projection?
Risk projection, also called risk estimation, attempts to rate each. risk in two
Risk table provides a project manager with a simple technique for risk
projection.
(1) Project team begins by listing all risks in the first column of the table.
Accomplished with the help of the risk item checklists.
(3) The probability of occurrence of each risk is entered in the next column of the
table.
(4) Individual team members are polled in round-robin fashion until their assessment
of risk probability begins to converge.
Assessing Risk Impact
Nature of the risk - the problems that are likely if it occurs.
e.g. a poorly defined external interface to customer hardware (a technical risk) will
preclude early design and testing and will likely lead to system integration problems
late in a project.
Scope of a risk - combines the severity with its overall distribution (how much of the
project will be affected or how many customers are harmed?).
Timing of a risk - when and how long the impact will be felt.
Overall risk exposure, RE, determined using:
RE = P x C
P is the probability of occurrence for a risk.
C is the the cost to the project should the risk occur.
RISK REFINEMENT
· A risk may be stated generally during early stages of project planning.
· With time, more is learned about the project and the risk
o may be possible to refine the risk into a set of more detailed risks
Subcondition 2. The design standard for component interfaces has not been solidified
and may not conform to certain existing reusable components.
Risk Mitigation :
It is an activity used to avoid problems (Risk Avoidance).
Steps for mitigating the risks as follows.
Finding out the risk.
Removing causes that are the reason for risk creation.
Controlling the corresponding documents from time to time.
Conducting timely reviews to speed up the work.
Risk Monitoring :
Risk Monitoring :
It is an activity used for project tracking.
It has the following primary objectives as follows.
To check if predicted risks occur or not.
To ensure proper application of risk aversion steps defined for risk.
To collect data for future risk analysis.
To allocate what problems are caused by which risks throughout the project
Drawbacks of RMMM:
Drawbacks of RMMM:
It incurs additional project costs.
It takes additional time.
For larger projects, implementing an RMMM may itself turn out to be another
tedious project.
RMMM does not guarantee a risk-free project, infact, risks may also come up
after the project is delivered.
5.2 Software Configuration Management
The term "SCM Repository" typically refers to a Source Code Management Repository.
It's a centralized location where software developers store, manage, and track changes
to their source code. Popular SCM systems include Git, Subversion (SVN), Mercurial,
and others.
The SCM repository typically contains the entire history of the project, including all
teams to coordinate their efforts, maintain code integrity, and easily roll back
changes if necessary.
The SCM (Software Configuration
Management) process
configuration files, and other related assets throughout their lifecycle. Here's