Question

You are the project manager for an upgrade of computers in your company. You need to...

You are the project manager for an upgrade of computers in your company. You need to upgrade 30 systems, including 10 desktops (for office personnel) and 20 laptops (for remote workers). Each system must access the company network, as well as a common installation of software, security components, and so forth. You must submit your risk identification in a summary that will be used during a presentation for the CIO.

In a 3–5 page document, complete the following:

  • Identify four (4) risks.
  • Describe the different types and how they are unique to this IT project.
  • What techniques did you use to identify these?
  • Explain how these risks are similar and may overlap.

You are the project manager for an upgrade of computers in your company. You need to upgrade 30 systems, including 10 desktops (for office personnel) and 20 laptops (for remote workers). Each system must access the company network, as well as a common installation of software, security components, and so forth. You must submit your risk identification in a summary that will be used during a presentation for the CIO

  • Identify four (4) risks.
  • Describe the different types and how they are unique to this IT project.
  • What techniques did you use to identify these?
  • Explain how these risks are similar and may overlap.

Homework Answers

Answer #1

The nature of any business is to adopt and adapt to changes. Therefore, an organization that is successful needs to embrace changes in a way that new threats and vulnerability that emerge on a daily basis is thwarted. One of the key steps in this process is to maintain software and systems that the employee use and executive management has the responsibility to oversee that this is successfully carried out. The organization has to recognize that IT functions in any organization is an important one as it ensures efficient and effective management of business. One of the critical functions of IT department is to make sure that all employees are equipped with current and secure software without which the risk of jeopardizing the business is high. Software and system upgrades are inevitable as the organizations that use them change as the business progresses.

Upgrading of systems and software in an organization is to be done with utmost care. There are risks that need to be managed in any upgrade project. A misstep in execution of upgrade project can have the negative impact of operations and service delivery that can result in the value reduction of the organization as well as the missed opportunities that would hinder the growth of the organization. Risk management in the IT World is quite complex with tasks that are tightly coupled and with many inter-dependencies. A well-defined management methodology of implementation of software and system upgrade can help in successfully completing this mission-critical project.

The first and foremost risk that is to be evaluated is the on-time and on-budget completion of the upgrade project. The risk arises due to direct and indirect cost associated with this project. The cost of upgrade procedures have to be evaluated from every angle, from the cost of the software and license of terms and conditions to the scheduled completion of the upgrade from start to finish. Every day, that a personnel is without a system, would amount to loss in productivity and hence a loss in revenue.

Risk of extended upgrade time can be managed quite effectively, if the steps involved are broken down in such a way that the system and software upgrades happen in a modular fashion with a set of related software upgraded at a time. This will ensure stability of the systems, especially in the situation where the upgrade is happening not in sequence.

Another risk that needs to be considered is the security compromise in the upgrade process. It is possible that there are security breaches in new version of the software, especially those that are releasing major versions. To avert the risk of compromising security, the software upgrade has to be tried in an isolated environment outside of the firewall so that any adverse effects are not affecting the enterprise network. A comprehensive evaluation of the software’s security architecture and its applicability to the company’s security policy is to be done before undertaking the upgrade.

It is possible that an upgrade of software, even though improves the system performance, could result in additional training for the employees. This cost is usually not anticipated many a times, but the lack of training could lead to lack of adoption and reduced productivity. This risk is to be averted in software upgrade. A way to mitigate this risk is to check into the functionalities of the new software and analyze them for the purpose of ease of use and radical changes from the previous version.

Even though the new software and system upgrade is economical and has packed features, it is possible that it is not compatible with the tools that are popularly used by the employees in the organization. These legacy tools probably would have wide adoption within the organization due to its simplicity and coverage of essential functionalities that are required by the personnel in carrying out their daily duties. This would cost quite a bit for the organization as the users will be at a loss to fill the gaps created by the void. A good way to degrade this risk is to perform a thorough auditing of the legacy tools and view them in the light of new system architecture.

The risks identified here are related to different aspects of software upgrades – adoption, security and productivity. There are similarities in these risk assessments in that they all relate to success of an organization. There is an overlap of risks in these tasks identified in IT system and software upgrade. Not analyzing thoroughly the legacy applications and providing ad hoc methods to carry out the functionalities with the upgrade will open up security holes that can bring the system down. Lack of training will lead to not being adopted and result in successful implementation of the upgrade as well.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Server Farm Inc. (SFI) needs to upgrade its server computers. Company management has identifi ed the...
Server Farm Inc. (SFI) needs to upgrade its server computers. Company management has identifi ed the following two options: (1) shift to a Windows - based platform from its current Unix - based platform, or (2) stick with a Unix - based platform. It is standard practice at SFI to use a triangular distribution to model uncertain costs. Along these lines, the company estimates that if it migrates to Windows, the new server hardware could cost as little as $100,000...
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
As the manager of a new website project for your company, you need to decide whether...
As the manager of a new website project for your company, you need to decide whether to create a new web application in-house or send the project out to a developer. The developer has quoted a project cost of $175,000. Based on previous work with this developer, you are 85 percent certain they will finish the work on time. Your in-house development team has quoted a project cost of $165,000. Based on previous work with the in-house team, you are...
Case You own a small computer business and you specialize in setting up networks for small...
Case You own a small computer business and you specialize in setting up networks for small businesses. The owner of a local sporting goods store has hired you to set up a local area network for his business. He wants to connect computers located in an office, on the selling floor, in a series of rooms in which he offers personal training classes, in a section of the store with batting cages, and in the section of the store that...
This case continues following the new project of the WePPROMOTE Company, that you and your partner...
This case continues following the new project of the WePPROMOTE Company, that you and your partner own. WePROMOTE is in the promotional materials business. The project being considered is to manufacture a very unique case for smart phones. The case is very durable, attractive and fits virtually all models of smart phone. It will also have the logo of your client, a prominent, local company and is planned to be given away at public relations events by your client. As...
Project Update 1 please just this question Write up to a 1/2 page on where you...
Project Update 1 please just this question Write up to a 1/2 page on where you are at on your ethics project Attached is my project, and I am using walmart. Please just do the half page summary.. the below is just my outline of what I will have due later. COMPANY PROJECT BUS 285 You are to analyze a company of you chose in the Orientation assignment. Your project must include the following sections, and at a minimum address...
In today’s mobile, cloud-first world, organizations are allowing unprecedented levels of work to be completed from...
In today’s mobile, cloud-first world, organizations are allowing unprecedented levels of work to be completed from outside of the office. Employees and employers both benefit from the flexibility and efficiency that arises when workers can perform their duties from coffee shops, airports, their homes, and more. As such, providing employees with the ability to work remotely is an excellent way to attract and retain a talented, productive team. The devices and security measures used throughout an organization play a significant...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director of Information Systems and Telecommunications. Your assignment is to assist security posture of the firm and develop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India and California. Ten accountants will be hired at each site....
Project Integration Management Questions Only A team member notifies you, after the fact, that she has...
Project Integration Management Questions Only A team member notifies you, after the fact, that she has added extra functionality to the project. There was no impact on the cost or schedule. What should be done as a result of this change? Make sure marketing is aware of the change. Implement change control processes to track the change. Inform the customer. Understand what functionality was added. You are having difficulty getting a project underway. You have not been able to get...
Case Study – Referral Report Healthcare Professionals – Project Case Study 3 You are required to...
Case Study – Referral Report Healthcare Professionals – Project Case Study 3 You are required to review the needs of the following client, research relevant treating health practitioners or services in your local area, and develop a referral report of approximately 250 words. Ensure that your referral includes the following information: • Purpose of referral • Client details/background • Summary of treatment the client has received to date • Reason for referring (including observed symptoms and limitations of expertise) •...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT