Risk their business needs and profile. A Risk Mitigation

Risk Mitigation
Strategies

Risk Mitigation is the effort to
reduce the risk impact and lessen the likeliness of it occurring again.  Within Risk Mitigation Strategies are four
tenets that are unique to Disaster Recovery and solid Continuity Plan: Risk
Acceptance, Risk Avoidance, Risk Limitation, and Risk Transference.  A company should choose one tenet hat is
tailored to their business needs and profile. A Risk Mitigation plan should
consist of a number of things: identify the root cause of risks, select
resources specific to risk mitigation, identify alternatives, assess layers of
mitigation alternatives, evaluate risks, and communicate results based on
findings to all parties.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Risk
Acceptance.  Levels
of risks that on a grand scale are acceptable on one hand, and intolerable on another.  This does not reduce its effects by one
instance.  Considered a common option
when matched against avoidance or limitations when it clearly outweighs the
risk itself.  A company may use risk
acceptance if they are out to save company funds and the likelihood of risks
occurring again are minimal.  A few
examples of risk acceptance are Investing (low level of risk), Insurance,
Derivatives, Projects, and Business Equity.

Risk
Avoidance.  The
elimination of risks by altering the parameters set forth. The risk is altered
so much that the value changes to either a reduced state or somewhat acceptable
value.  Be careful not to avoid one risk
and be bombarded by an unknown greater risk. Risk avoidance is quantitative in
nature.  A quantitative risk assessment will
assess the change made to assess if it is worth the cost differential.  Considered the most expensive strategy and underutilized
because certain risks are better left untouched.

Risk
Limitation. Most common strategy used among
businesses. This limits exposure to risks by leveraging some sort of action. It
combines both risk avoidance and acceptance. Companies that have properly
planned and evaluated for unexpected losses and have taken the steps to reduce
its impact.  An example would be
identifying alternate locations for a brief beforehand if the original site was
no longer available. Hindering the original location but not the entire plan
for the brief to be given.  Risk
limitation should be built in stages, tailored to one’s own experiences.  One would never fail if he/she has multiple
avenues to exhaust.

Risk
Transference.  Shifting
risk to a willing third party is a preferred method in regards to risk transference.
 There are many companies who would
rather invest in another company to deal with certain operations that is either
foreign to them or who is able to take on said risks.  This can be payroll services or simply
customer service for IT needs.  It also
allows the company to shift more focus on other important things.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References:

Lee,
K. (2017). Electrical Energy Advantages & Disadvantages. Retrieved 31
December 2017 from https://sciencing.com/electric-energy-advantages-disadvantages-6008663.html

Margulescu,
S., & Margulescu, E. (2013). Parametric Insurance Cover for Natural
Catastrophe Ricks. Global Economic Observer, 1(2), 97-103.
Retrieved 31 December 2017 from https://search-proquest-com.ezproxy2.apus.edu/docview/1680216993?accountid=8289

Molis, A. (2011). Building methodology, assessing the
risks: The case of energy security in the baltic states. Baltic Journal of
Economics, 11(2), 59-80. Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/921542187?accountid=8289

Research and markets; risk assessment of network security
– report finds medium-sized enterprises way ahead of their smaller counterparts
in providing network security. (2010, Jun 07). Network Weekly News
Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/356952119?accountid=8289

“Risk”.
Merrium-Webster. Retrieved 31 December 2017 from https://www.merriam-webster.com/dictionary/risk

“5
Risk Mitigation.” National Research Council. 2005. The Owner’s
Role in Project Risk Management. Washington, DC: The National Academies
Press. doi: 10.17226/11183

Rossebø,
J. et al., (April 2017). An Enhanced Risk-Assessment Methodology for Smart
Grids. Computer, vol. 50, no. 4, pp. 62-71, doi: 10.1109/MC.2017.106 http://ieeexplore.ieee.org.ezproxy2.apus.edu/stamp/stamp.jsp?tp=&arnumber=7912265&isnumber=7912159

Wee, N. (June 2003). An
Overview of Practical Risk Assessment Methodologies. https://www.giac.org/paper/gsec/3287/overview-practical-risk-assessment-methodologies/105426

Wood, C. (n.d.). Risk Assessment Methodology: Anatomy of
the Risk Assessment Process.
http://searchsecurity.techtarget.com/Risk-assessment-methodology-Anatomy-of-the-risk-assessment-process