{"id":1166,"date":"2018-03-14T04:38:29","date_gmt":"2018-03-14T01:38:29","guid":{"rendered":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/?page_id=1166"},"modified":"2018-03-14T16:05:44","modified_gmt":"2018-03-14T13:05:44","slug":"risk-assessment-methods","status":"publish","type":"page","link":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/continuity-resilience-recovery\/risk-assessment-methods\/","title":{"rendered":"Risk Assessment Methods"},"content":{"rendered":"<!--[fluid]--><!--{content}-->    <!--[section]-->\n\t\t<style>\n.bd-section-1236282971{background-color:#0aa6ce;}\n.bd-section-1236282971{\n\ttext-align:  center;\n}\n<\/style>\t\t<section id=section33 class=\" bd-section-1236282971 bd-page-width  bd-tagstyles\" data-section-title=\"Section\">\n\t\t\t<div class=\"bd-container-inner bd-margins clearfix\">\n\t\t\t\t<!--{content}-->\n\t\t\t\t\t<!--[image]--><style>\n.additional-class-1021212870{width:100%;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/12\/risk-assessment-methods.jpg\" alt=\"Risk Assessment Methods, Continuity, Resilience &amp; Recovery\" class=\" additional-class-1021212870   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\t\t\t\t<!--{\/content}-->\n\t\t\t<\/div>\n\t\t<\/section>\n\t<!--[\/section]-->\n<!--{\/content}--><!--[\/fluid]-->\n    <!--[section]-->\n\t\t\t\t<section id=section5 class=\" bd-section-748556175  bd-tagstyles\" data-section-title=\"\">\n\t\t\t<div class=\"bd-container-inner bd-margins clearfix\">\n\t\t\t\t<!--{content}-->\n\t\t\t\t\t    <!--[columns]-->\n        <style>\n.bd-layoutcontainer-1739312503 > .bd-container-inner > .container-fluid > .row{height:100%;margin:0px;}\n.bd-layoutcontainer-1739312503 > .bd-container-inner > .container-fluid > .row > div{padding:0px;}\n.bd-layoutcontainer-1739312503  > .bd-container-inner > .container-fluid:after{display:none;}<\/style><style>\n.bd-layoutcontainer-1739312503 > .bd-container-inner > .container-fluid, .bd-layoutcontainer-1739312503 > .bd-container-inner > .container-fluid > .row{height:100%;}<\/style><style>.bd-layoutcontainer-1739312503 > .bd-container-inner > .container-fluid {padding-left: 0; padding-right: 0;}<\/style>        <style>\n.bd-layoutcolumn-1560760876{background-color:#ffffff;min-height:250px;-webkit-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-o-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-ms-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-moz-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);margin:-4em 2em 2em;padding:2em;border-radius:20px;}\n@media (max-width: 767px) {.bd-layoutcolumn-1560760876{margin:-2em 1em 2em;}}<\/style>        <div class=\" bd-layoutcontainer-1739312503  bd-columns bd-no-margins\">\n            <div class=\"bd-container-inner\">\n                <div class=\"container-fluid\">\n                    <div class=\"row bd-row-flex bd-row-align-middle\">\n                        <!--{content}-->\n                                <!--[column]-->\n        <div class=\"col-lg-12 bd-columnwrapper-1560760876\">\n            <div class=\"bd-column  bd-layoutcolumn-1560760876  bd-no-margins\">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[html]--><style>\n.additional-class-249954130{padding-right:1em;padding-left:1em;}<\/style><style><\/style><div class=\"bd-tagstyles  additional-class-249954130 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h1>Risk Assessment Methods<\/h1>\r\n<h5 style=\"text-align:center\"><b>Continuity, Resilience & Recovery<\/b><\/h5>\r\n\r\n<p><b>Risk assessment<\/b> has become an integral part of the risk management process. In fact, a project cannot be approved for execution unless a thorough assessment of risks has been done. While the methodology remains the same, the types of risks will vary a great deal in terms of seriousness, frequency and impact. A few risk assessment samples are highlighted to give the reader an understanding of the risk assessment procedure.<\/p>\r\n\r\n<p>Risk identification is the process that leads to risk assessment. Without proper identification of risks, projects risks cannot be assessed and reports related to it generated. Hence, by using many techniques like the SWOT Analysis, PESTLE Analysis, Delphi technique, Interviewing, Brainstorming, etc, a major proportion of project risks are identified. While not all of them may be serious, there are those which can make a huge impact on the project's functioning and result. Hence, this identification leads to the process of risk assessment, where risks are assessed for their probability and impact.<\/p>\r\n\r\n<p><b>Methods<\/b><\/p>\r\n<ul>\r\n<li>Use a what-if analysis to identify threats and hazards.\r\nWhat-if questions are asked about what could go wrong\r\nand about what would happen if things do go wrong. This\r\ntype of analysis is a brainstorming activity and is carried\r\nout by people who have knowledge about the areas,\r\noperations, and processes that may be exposed to\r\nhazardous events and conditions.<\/li>\r\n<li>Use a checklist of known threats and hazards to identify\r\nyour threats and hazards. The value of this type of analysis\r\ndepends upon the quality of the checklist and the\r\nexperience of the user.<\/li>\r\n<li>Use a combination of checklists and what-if analysis to\r\nidentify your threats and hazards. Checklists are used to\r\nensure that all relevant what-if questions are asked and\r\ndiscussed, and to encourage a creative approach to \r\nrisk assessment.<\/li>\r\n<li>Use a hazard and operability study (HAZOP) to identify your\r\nthreats and hazards. If you need to do a thorough analysis,\r\nthis method is for you. However, it requires strong leadership\r\nand is costly and time consuming. It also assumes that you\r\nhave a very knowledgeable interdisciplinary team available to\r\nyou, one with detailed knowledge about the areas, operations,\r\nand processes that may be exposed to hazardous events and\r\nconditions.<\/li>\r\n<li>Use a failure mode and effect analysis (FMEA) to identify\r\npotential failures and to figure out what effect failures would\r\nhave. This method begins by selecting a system for analysis\r\nand then looks at each element within the system. It then tries\r\nto predict what would happen to the system as a whole when\r\neach element fails. This method is often used to predict\r\nhardware failures and is best suited for this purpose.<\/li>\r\n<li>Use a fault tree analysis (FTA) to identify all the things that\r\ncould potentially cause a hazardous event. It starts with a\r\nparticular type of hazardous event and then tries to identify\r\nevery possible cause.<\/li>\r\n<\/ul><!--{\/content}--><\/div><\/div><!--[\/html]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n                        <!--{\/content}-->\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/columns]-->\n\t\t\t\t<!--{\/content}-->\n\t\t\t<\/div>\n\t\t<\/section>\n\t<!--[\/section]-->\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2330,"parent":1158,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/1166"}],"collection":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/comments?post=1166"}],"version-history":[{"count":0,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/1166\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/1158"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/media\/2330"}],"wp:attachment":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/media?parent=1166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}