Risk Analysis

Written authorization to go live via Greg Kilchenstein

Debbie,
Please use this email as my concurrence with the attached JTEG Website Risk Management Matrix. Once back in my office I will sign and date and forward as required. For now, please attach this email to the risk matrix on the website as our authorization to go live. Thanks again to you and your team for all of the hard work NCMS done in support of the Mx Technology community! 

Click here to view signed PDF document.

VR/Greg

Identify Hazards and Subsequent Risks

Evaluate Risk

Identify & Evaluate Existing Risk Controls

Further Risk Treatments
Hazards/Issues/Risks

Likelihood

Risk Level

What are we doing now to manage this risk?

Effectiveness

New Risk Level

Further actions neededOpportunities for improvement
Attempts at Unauthorized Entry to Working Area

F

Moderate

No self-registration. Access is Username/Password as well as custom access level controlled

Good

Low

Human Error results in Posting FOUO or proprietary information on the website

E

High

Posted warnings on submission process, at the bottom of each page, all postings require Principal and co-chair approval

Good

Low

Software Incompatibility

C

Low

Website support available via Contact Form.

Good

Low

There may be minor compatibility errors with older versions of IE. Can be worked around via support.
Software Malfunction

D

Low – Moderate

Update software add-ons or replace add-on with more compatible alternative.

Good

Low

Malware

E

Low -Moderate

Anti-Malware programs scan 100% of submitted files

Good

Low

Spamming – Overloading of System

D

Low – Moderate

Can add Captcha to form verifying submitter is human and not an automated spam bot

Good

Low

 

LIKELIHOOD

A

Almost certain to occur in most circumstances

B

Likely to occur frequently

C

Possible and likely to occur at some time

D

Unlikely to occur, but could happen

E

May occur, but only in rare and exceptional circumstances

F

Cannot occur without intentional misconduct, hacking, unintentional/intentional sharing of Username/Password, etc.