You are on page 1of 2

Documenting the context provides an overview of the

organisation, its objectives and specific criteria for


business success, the objectives and scope of the risk
assessment activity and a set of key elements for
structuring the risk identification activity.

Risk detection is an essential aspect of risk assessment. Prior awareness of the


extent, length and effects of hazards is important for successful risk assessment
and vulnerability mitigation.
Risk Recognition is an active and continuing task that takes place throughout the
risk assessment phase and during the life-cycle of a project. Any form of risk
recognition should be involved in-phase of the risk management process. Plan
events such as programmatic and operational workshops, risk assessments,
scenario preparation, teleconferences, evaluations put current and old plan
threats to light. The lessons learned libraries are often a valuable guide for
detecting possible threats.

Documenting the context provides an overview of the organisation, its objectives


and specific criteria for business success, the objectives and scope of the risk
assessment activity and a set of key elements for structuring the risk
identification activity.
This practice includes risk identification, risk interpretation, risk management ,
risk treatment and risk monitoring.

Risk Identification:
The goal is to determine what, when, when and how this might impact the
capacity of a organization to survive.

Risk Interpretation:
This phase includes the assessment of the possibility of a danger occurrence and
its possible consequences.

Risk management:
Risk management measures the risk 's magnitude and rates them by prominence
and impact.

Risk Treatment:
Risk management is often called Reaction Response Planning. This phase includes
the planning of risk reduction measures, preventive treatment and backup plans
focused on the importance of each danger evaluated.

Risk monitoring:
Risk monitoring is an interruptive and time-changing operation. Risk monitoring.
The systems are replicated and constantly tracked to optimize awareness of
identified and potential threats.

You might also like