Mission Assurance Analysis Protocol M A A P - Kameswari Palepu (Kamu)

Slides:



Advertisements
Similar presentations
Roadmap for Sourcing Decision Review Board (DRB)
Advertisements

Executive Mistakes in Healthcare Paul B. Hofmann, DrPH, FACHE Hofmann Healthcare Group Moraga, California, USA.
A brief overview What is program evaluation? How is an evaluation conducted? When should it be used? When can it be used? Used with Permission of: John.
Chapter 6 Database Design
1 Module 1 INTRODUCTION TO DECISION ANALYSIS. 2 Introduction To Decision Analysis Learning Objectives Reasons for studying decision analysis Basic sources.
COMP8130 and COMP4130 Adrian Marshall Verification and Validation Risk Management Adrian Marshall.
1-1 Copyright © 2004 by Nelson, a division of Thomson Canada Limited. Introduction: The Role, History, and Direction of Management Accounting 1 PowerPresentation®
ENVIRONMENTAL MANAGEMENT PLAN
SQM - 1DCS - ANULECTURE Software Quality Management Software Quality Management Processes V & V of Critical Software & Systems Ian Hirst.
By: Ashwin Vignesh Madhu
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
6 Chapter 6 Database Design Hachim Haddouti. 6 2 Hachim Haddouti and Rob & Coronel, Ch6 In this chapter, you will learn: That successful database design.
Accounting Information Systems: An Overview
Annex I: Methods & Tools prepared by some members of the ICH Q9 EWG for example only; not an official policy/guidance July 2006, slide 1 ICH Q9 QUALITY.
Purpose of the Standards
Planning and Strategic Management
RISK MANAGEMENT IN SOFTWARE ENGINEERING RISK MANAGEMENT IN SOFTWARE ENGINEERING Prepared by Prepared by Sneha Mudumba Sneha Mudumba.
Decision Making Dr Vasuprada Kartic NAC Batch IX PGDCPM.
Environmental Risk Analysis
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Test Organization and Management
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS DRIVEN TECHNOLOGY Business Plug-In B10 Project Management.
Risk management in Software Engineering T erm Paper By By Praveenkumar Sammita Praveenkumar Sammita CSC532 CSC532.
Basics of OHSAS Occupational Health & Safety Management System
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
Copyright © 2014 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 18 Mixed Methods and Other Special Types of Research.
Software Engineering 2003 Jyrki Nummenmaa 1 REQUIREMENT SPECIFICATION Today: Requirements Specification Requirements tell us what the system should.
IT Risk Management, Planning and Mitigation TCOM 5253 / MSIS 4253
SE-02 SOFTWARE ENGINEERING LECTURE 3 Today: Requirements Analysis Requirements tell us what the system should do - not how it should do it. Requirements.
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
IST 210 Database Design Process IST 210 Todd S. Bacastow January 2005.
1 Chapter 9 Database Design. 2 2 In this chapter, you will learn: That successful database design must reflect the information system of which the database.
Week 4 Lecture Part 3 of 3 Database Design Samuel ConnSamuel Conn, Faculty Suggestions for using the Lecture Slides.
GBA IT Project Management Final Project - Establishment of a Project Management Management Office 10 July, 2003.
Chapter 1 Accounting Information Systems: An Overview Copyright © 2012 Pearson Education 1-1.
How To Build a Testing Project 1 Onyx Gabriel Rodriguez.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
© 2011 Underwriters Laboratories Inc. All rights reserved. This document may not be reproduced or distributed without authorization. ASSET Safety Management.
Team Assignment 15 Team 04 Class K15T2. Agenda 1. Introduction 2. Measurement process 3. GQM 4. Strength Weakness of metrics.
+ risk management 101 measuring, managing & monitoring risk: a km approach kmworld09
1 Designing Effective Programs: –Introduction to Program Design Steps –Organizational Strategic Planning –Approaches and Models –Evaluation, scheduling,
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
Getting There from Here: Creating an Evidence- Based Culture Within Special Education Ronnie Detrich Randy Keyworth Jack States.
Screen 1 of 20 Vulnerability Vulnerability Assessment LEARNING OBJECTIVES Define the purpose and scope of vulnerability assessment. Understand how vulnerability.
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
Initiation and Planning for Success Sridhar Seshagiri Rao, PMP Innova Solutions Inc. Santa Clara, CA. April 9 th 2004.
IAEA International Atomic Energy Agency Methodology and Responsibilities for Periodic Safety Review for Research Reactors William Kennedy Research Reactor.
An EDI Testing Strategy Rosemary B. Abell Director, National HIPAA Practice Keane, Inc. HIPAA Summit V October 30 – November 1, 2002.
Thomas L. Gilchrist Testing Basics Set 3: Testing Strategies By Tom Gilchrist Jan 2009.
Project Management Training
SRR and PDR Charter & Review Team Linda Pacini (GSFC) Review Chair.
Claudia COLICCHIA Carlo Cattaneo University - LIUC NESA, Helsinki 9-10 June 2008.
Operational Risk. Introduction operational risk has proved to be an important cause of financial losses. Indeed, most financial disasters can be attributed.
IFS310: Module 2 1/18/2007 Systems Planning and SDLC.
Week 2 – Risk Planning & Identification. Risk & Risk Management.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
IST 210 Database Design Process IST 210, Section 1 Todd S. Bacastow January 2004.
Toward a New ATM Software Safety Assessment Methodology dott. Francesca Matarese.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
THINK DIFFERENT. THINK SUCCESS.
An Overview on Risk Management
Software Risk Management
BUSINESS DRIVEN TECHNOLOGY
Research methodology.
Operations Consulting and Reengineering
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
Software Project Management
Take Control Over Underwriting Quality and Leakage
Taking the STANDARDS Seriously
State University of Telecommunications
Presentation transcript:

Mission Assurance Analysis Protocol M A A P - Kameswari Palepu (Kamu)

Overview Introduction Introduction Definitions Definitions Risk Management Risk Management Operational Risk Management Operational Risk Management Mission Assurance Mission Assurance Strategy Strategy Analysis Analysis Source of Operational Risk Source of Operational Risk M A A P M A A P

Introduction Increasing complexity of the business structure Increasing complexity of the business structure Globalization of businesses Globalization of businesses Presence of distributed environment Presence of distributed environment Absence of single point of control Absence of single point of control Conventional risk analysis techniques Conventional risk analysis techniques Outcome of new risk analysis techniques Outcome of new risk analysis techniques ~ MAAP~ ~ MAAP~

Definitions Risk Risk is the possibility of suffering harm or loss is the possibility of suffering harm or loss Operational Risk Operational Risk is the possibility of direct or indirect loss resulting from failed or inadequate internal processes or from failures caused by people, technology, or external events. is the possibility of direct or indirect loss resulting from failed or inadequate internal processes or from failures caused by people, technology, or external events. Operational Risk Tolerance Operational Risk Tolerance is the maximum overall exposure to operational risk that will be accepted is the maximum overall exposure to operational risk that will be accepted Mission Mission is the set of objectives pursued by a person or group is the set of objectives pursued by a person or group

Risk Management Definition Definition Examples Examples Common Characterisitic of Risk Management Common Characterisitic of Risk Management There must be a loss associated with the situation There must be a loss associated with the situation There must be some uncertainty with respect to the eventual outcome There must be some uncertainty with respect to the eventual outcome There must be some choice or decision required There must be some choice or decision required When management of a process is distributed, controlling operational risk becomes more difficult. When management of a process is distributed, controlling operational risk becomes more difficult.

Operational Risk Analysis Operational Risk Analysis in a parallel distributed environment is incomplete Operational Risk Analysis in a parallel distributed environment is incomplete some sources are excluded from the risk some sources are excluded from the risk Interrealationships and dependencie are not typically established Interrealationships and dependencie are not typically established Impact of risk is difficult to characterize – based on the environment Impact of risk is difficult to characterize – based on the environment Issues related with Operational Risk Management Issues related with Operational Risk Management

Mission Assurance Definition Definition Mission Assurance is taking due care to reduce operational risk to the mission to an acceptable level

Mission Assurance Strategy Mission Assurance Strategy Reduce operational risks to an acceptable level Resolve problems that occur Manage operational riskResolve problems that occur Mitigate operational risk

Mission Assurance - Analysis The scope of the analysis is set according to the mission being pursued The scope of the analysis is set according to the mission being pursued The interrelated process model for achieving the mission are defined The interrelated process model for achieving the mission are defined The criteria is established for measuring the risk, and the tolerance are defined The criteria is established for measuring the risk, and the tolerance are defined The different tools and techniques for data gathering and analysis are selected The different tools and techniques for data gathering and analysis are selected

Mission Assurance – Analysis(contd …) The operational risk data is collected The operational risk data is collected Analyze the operational risk to the mission Analyze the operational risk to the mission Required actions are then taken to reduce the risk in the mission Required actions are then taken to reduce the risk in the mission

Sources of Operational Risk Mission Mission Design Design Execution Execution Environment Environment Event Event

M A A P Defintion Defintion A systematic methodology for identifying and analyzing operational risks when management control of work processes is distributed among multiple organizations or groups A systematic methodology for identifying and analyzing operational risks when management control of work processes is distributed among multiple organizations or groups Provides an integrated view of operational risk Provides an integrated view of operational risk Assures the completion of the project or the mission Assures the completion of the project or the mission Addresses any risk analysis issues, if present Addresses any risk analysis issues, if present

M A A P – Implementation PHASE – I PHASE – I Develop Operational Model Develop Operational Model PHASE – II PHASE – II Prepare to conduct analysis Prepare to conduct analysis PHASE – III PHASE – III Conduct analysis Conduct analysis

M A A P – A Common Basis For Analysis

Future Directions Refine the idea of MAAP so it can be used in different venues Refine the idea of MAAP so it can be used in different venues Increase its applications Increase its applications Software Assurance Software Assurance Operational Security Operational Security Supply Chain Management Supply Chain Management Focus exclusively on analyzing operational risk in distributed environments Focus exclusively on analyzing operational risk in distributed environments

References 1. Alberts, J. Christoper, Audrey,J. Dorofee, “MAAP –Mission Assurance Analysis Protocol, Assessing Riks in Complex Environement” 1. Alberts, J. Christoper, Audrey,J. Dorofee, “MAAP –Mission Assurance Analysis Protocol, Assessing Riks in Complex Environement” 2. Recognition and Analysis of Complex or Severe Network Security Incidents, 2. Recognition and Analysis of Complex or Severe Network Security Incidents, 3. Williams, Ray, Pandelios, George, Behrens, Sandra, “ Software Risk Evaluation (SRE) – Method Description”, body.pdf body.pdfhttp:// body.pdf 4. Baroff, E. Lynn, “Human Factors in Mission Assurance”, er=27691http://ieeexplore.ieee.org/iel5/8735/27691/ pdf?tp=&arnumber= &isnumb er= http://ieeexplore.ieee.org/iel1/21/7524/ pdf?tp=&arnumber=310528&isnumber=75 24> 5. Giampiero, E. G. Beroggi, William, A. Wallace, “ Operational Risk Management – A New Paradigm in Decision Making”, 24

Thank You !!