risk management in telecommunications
TRANSCRIPT
8/7/2019 Risk Management in Telecommunications
http://slidepdf.com/reader/full/risk-management-in-telecommunications 1/10
-,-@
f¾¾
@n¯¾°¾¾°f°n
[\U_SZSYWWZ`ZWWU[aZUS`[Z_
-@
°9¯ff©f°°f°
f°f½
9°f°f°
fn°f°
°fff
,f°9f¾
8/7/2019 Risk Management in Telecommunications
http://slidepdf.com/reader/full/risk-management-in-telecommunications 2/10
_SZSYWWZ`ZWWU[aZUS`[Z_
_ [\W^S`[^_ c ^_ SZSYW S SZ [\W^S`[ZS WbW T `W VW_YZ [X `WW\[ZW
ZW`c[^_ Z[^VW^ `[\^[bVW S ^WSTW_W^bUW `[ `_ Ua_`[W^_SZV SVV^W__ U[[Z
VWZ`XSTW `^WS`_ _aU S_ X^W _SXW` SZV _WUa^` __aW_ ` __WWZ `S` \^[UWVa^W_ [^_`SZVS^V_S^W[X`WZS\\WV[ZSTSZW`TS__^^W_\WU`bW[X`WWbW[X^_\^W_WZ`WVZ[^
V[ `W_W ^WXWU` W\W^WZUW W`W ZS [ZS[^ Z`W^ZS`[ZS_ WSZ_ `S` _US^UW
^W_[a^UW_S^W[X`WZVa`WVWSbZYU^`USS^WS_[X`WTa_ZW__aZVaW\[_WVc_`W__
\[^`SZ`XSU`W_WZ[WZbSTWWbW_[XS``WZ`[ZWS_`[S___`Z`S^YW ZY^_
SZSYWWZ``[\^[VaUW`W[_`WXXWU`bWU[Z`^[[X^_c`Z`WU[\SZ
Z[^VW^`[U[WZUW`W\^[UW__[X^_SZSYWWZ``_XW``S`SU[\SZZWWV_`[
S__W__ `W ^WS`bW W[[V SZV \SU [X S _W^W_ [X `^WS`_ `[ `_ Ta_ZW__ _ _
TWUSa_W`_`W_W^bUW_`S``WU[\SZ\^[bVW_`S`_`W\[^`SZ`__aW^S`W^
`SZSU ZY S_Ua_`[VSZ [XS U[Z_VW^STWS__W`TS_W__aUSZ WbSaS`[Z[X \SU`
a_ ZUaVW SZ S__W__WZ` [X `[_W WXXWU`_ cU [X`WZ USZZ[` TW WS_a^WV Z UWS^
XZSZUS`W^_a_`[W^U[ZXVWZUW`W[\Z[Z_[XWY_S`[^_`Wa_WSVW[XZUVWZ`_
T U[\W``[^_ S^W _[W [X `W ^SZYW [X _[US U[W^US \[`US SZV [UUS_[ZS
ZS`[ZS_WUa^`__aW_cUa_`TWU[Z_VW^WV
WU[\SZ_[aV_W``_[cZaVYWWZ`U^`W^S^S`W^`SZX[[c`[_W\[_WVTSZ
W`W^ZSSa`[^`_aUS_Z_a^W^_c[ca_aSX[Ua__[W[Z`WXZSZUS[__`_
\[^`SZ`cWZTSSZUZYU[_`[X^_c``WU[_`[X^_^WVaU`[ZWS_a^W_ `S``W
`^aW\U`a^W_a_WVZSZVWU_[ZSZY\^[UW__W^W`WU[\SZSbW_WXZ_a^WV^__ `W c ZWWV `[ WbSaS`W `W `[`S U[_ `[ WZ_a^W `W ^_ U[Z`^[ WS_a^W_ [^
SUUW\`SZUWWbW_S^WT[`S\\^[\^S`WSZVWXXWU`bW
ZSUU[^VSZUWc``W^S\VY^[c``S`S_TWWZ_WWZZ`WZVSZWWU[ZVa_`^`W
W^_XSU`[^_X[^`WbS^[a_\SW^_SbWS_[`^SZ_X[^WV_YZXUSZ``_TWWbWV
`S``WUSZYW_Z`W`WWU[ZVa_`^_XaZVSWZ`S_SbWWV`[SZ\^[bWWZ`Z`W
U^WV`^_\^[XW[X`WZVa_`^S_Sc[W
W [\ a_ZW__ __ Z `W WWU[ ZVa_`^ S TW
VbVWVZ`[]aSV^SZ`_S_
S `^S`WYU`^WS`_Ì^WS`WV`[Ua_`[W^_U[\W``[^_SZVZbW_`[^_
T [\SZUW `^WS`_ Ì [ YZS`ZY Z \[`U_ Sc ^WYaS`[Z [^ U[^\[^S`W
Y[bW^ZSZUW
U \W^S`[ZS`^WS`_ÌSXXWU`ZY`W\^[UW__W___`W_\W[\WSZV[bW^SbSaW
V ZSZUS`^WS`_Ì_`WZYX^[b[S``ZS^W`_SZV`W^WSWU[Z[
8/7/2019 Risk Management in Telecommunications
http://slidepdf.com/reader/full/risk-management-in-telecommunications 3/10
WWU[_[\W^S`[^_Z[c_S^W`W^Ua_`[W^_c`[`W^\SW^_ZT[``WU[Z_aW^
SZVWZ`W^\^_WS^W`_WW`[^WW_`ST_ZY[cZW^_\_USZYZY`WUa_`[W^_
ZV_W ST[a` `W bSaW [X `W ZW`c[^ `^[aY UWS U[aZUS`[Z SZV ^S`W_
ZUSZYWVS`ZaTW^
SZWZ`W^\^_WUa_`[W^_Z[cZ[[ZYW^US^WX`WTa`W^`WWU[__W^bUW_X^[S`^SV`[ZS [\W^S`[ [^ _[W[ZW W_W ZV `W T^SZV bSaW [X `W WSVZY `WUZ[[Y
\SW^_`\US[a`_`^\_`S`[X`WWSVZY`WWU[_U[\SZW_
WSZcWSZZ`WZ_XZYU^[___WU`[^TS``W_aZVW^cSX[^`W[S`SZVWZYSYWWZ`
[X [\W^S`[^_ Ua_`[W^_ S^`\[ZW a_W^_ X[^ WS\W VWZ`X _`^[ZY c` VWbUW
SZaXSU`a^W^T^SZV_S_S^WS_[Z`[_c`U[\W^S`[^__WcW^WUSTW\SW^_S^W_`^[ZY
8/7/2019 Risk Management in Telecommunications
http://slidepdf.com/reader/full/risk-management-in-telecommunications 4/10
\[_ [ZWV `[ cZ Z `W TS``W X[^ `W `^\W\S Ua_ [W cW S ZWc cSbW [X cWT
S\\US`[Z_U[Z`ZaW_`[aZVW^ZWWYSUb[UWSZVVS`S_W^bUW_
`[SZSYW `W ^__S^[aZVUa_`[W^[cZW^_\ WXXWU bWSZV _a_`SZST `W W X[^
[\W^S`[^_ c TW `[ WZYZWW S USZYW Z Ua_`[W^_ ZV_W` `[ ^WXWU` `W ^WS SZV
_aT_`SZ`S U[Z` Ta`[ZSVW T `WWU[_ U[\SZW_ `[ `W [bW^S _W^bUWW\W^WZUWW``ZY`_W__SYWSU^[__c^W]a^WUWS^SZVU[Z__`WZ`U[aZUS`[Z[Z`WbSaW
[X`WZW`c[^SZV[ZcS```SW_`[\^[bVWY]aS`_W^bUW_
WU[_ SbW aZ]aW US\ST`W_ _aU S_ `W TZY SZV \SWZ` WZYZW_ SZV `W^
Ua_`[W^ ZX[^S`[ZS__W`_^WbWSS `\W[X WZVa_W^[cZW^_\`S`S_W `[TW Xa
W\[`WVW`W^T`W_WbW_[^`^[aY`^V\S^`W_
W`WZ`[Z_`^S`WYW_SbWSU`aSTWWZVW_`^[ZYbSaWc`TaZVWV[XXW^_ZXWVSZV
XS`^S`W[XXW^_ Z `W [TW S^W SbZY `W WXXWU [XcVWZZY\^[VaU`_U[\WS` `W
W\WZ_W [X \^[VaU` \^[X`ST` ` U[Z_aW^_ Z[c SZY Y^[cZY a_W [X [TW
Z`W^ZW`ZWcX[^_[X^WbWZaWUSZZTSS`[ZS^WaZVW^cS_aUS__aT_``a`[Z[XS
[aUSZWS`[TWVS`Sa_SYWX[^a_SYW\^UWV
ZSZUS_W_[\W^S`[^_Ua^^WZ`_`^S`WYW_X[^^W`SZZYUa_`[W^_S^WSU`aSVW_`^[ZY
bSaWX[^WS\WTcVWZZY\^[VaU`_U[\WS``WW\WZ_W[X^WbWZaWSZV\^[X`ST`
\W^S`[^_ZWWV`[^WSW`WXabSaW[XUa_`[W^_T^WU[YZZYSZVWbW^SYZY`W^
[cZ`^SZ_X[^S`bW\[cW^
SZ `WU[_ SbW S^WSV _`^WZY`WZWV `W^ X[Ua_ [Z Ua_`[W^ bSaW T ^W[^YSZZY
`W_WbW_S[ZYUa_`[W^ZW__aUS_U[Z_aW^SZVWZ`W^\^_WVb_[Z_^S`W^`SZ
`WUZ[[YZW__aUS_XWVSZV[TWWS^WS_[VWZ`XZYSZV`^ZY[a`ZWc
[VW__aUS__WZY_S^`\[ZWS\\US`[Z_Z^W`a^ZX[^S\^[\[^`[Z[X`W^WbWZaW_SZV ZZ[bS`ZY Z \S^`ZW^_\ c` VWbUW SZV S\\US`[Z VWbW[\W^_ `[ U^WS`W
VXXW^WZ`S`WVW\W^WZUW_
W`c[^ZWa`^S`_V[ZS`ZY`WY[TS^WYaS`[^SYWZVSSZV_cVWZZYZ`W `[ ZUaVW [TW _W^bUW_ Z \S^SW VbW^_W ^WYaS`[Z_ S^W Wb[bZY SU^[__ VXXW^WZ
_WYWZ`_ SZV Y[bW^ZWZ`_ S^W [[ZY `[ T[[_` `S ^WbWZaW_ W [bW^S ZWWV _ X[^
Y^WS`W^^WYaS`[^UW^`SZ`
_ USZYW [X X[Ua_ ^WXWU`_ `W ^_W [X ZW`c[^ ZWa` S` S_ `W V[ZSZ Y[TS
^WYaS`[^__aWZVW^`_U[ZUW\`[\W^S`[^_a_``^`[\^[bVWZW`c[^TSZVcV`[Z
SZW]aSTS__ `[SS\\US`[Z_ ^^W_\WU bW [X[c aU TSZVcV` WSU S\\US`[Z
8/7/2019 Risk Management in Telecommunications
http://slidepdf.com/reader/full/risk-management-in-telecommunications 5/10
U[Z_aW_ ` VS`S `^SXXU ^_ZY ZW[^ST SZV aZ\^WVU`ST ZW`c[^ ZWa`^S`
`^WS`WZ_`[aZVW^ZW `W UW^`SZ` [X XZSZUS ^W`a^Z`S`[\W^S`[^_ZWWV Z[^VW^ `[
S[US`W`WZW`cSbW[XZW`c[^US\W
[TW [\W^S`[^_ S^W _WWZY ^[SZY SZV `W^ZS [Z ^S`W ^WVaU [Z_ S_ cW S_ `W
\^[_\WU`[XZW`c[^ZWa`^S`XWV[\W^S`[^_S^WXSUZYXTW^^WYaS`[Z_aUS_ZW`c[^aZTaZVZY SZV VaU` SUUW__ SZV _W^bUW_ S^W XSUZY USWZYW_ S^[aZV U[Z`WZ
WUa_b`YW^WbW_[X_`S`W_a\\[^`USZU^WS`WZWc\^[TW_X[^Y[bW^ZWZ`__aU
S_VWS_ [bW^ cW`W^ `[ X[Ua_[Z U[_ZY `W VY S VbVW [^T[[_ ZY `W XS_ W_`
_\WWV_Z`WS^W`
VbSZUZY `WUZ[[Y SZV aZUW^`SZ ^W`a^Z_ WSZ [\W^S`[^_ XSUW ZWc U[UW_ SZV
U[Z_VW^S`[Z_Z`W^ZW`c[^US\W_`^S`WYW_SYSZ_`STSUY^[aZV[XWb[bZYZS`[ZS\[UW_W`ZY[XZbW_`WZ`_S_[U^aUSc`VWU_[Z_`[WS\X^[Y`WUZ[[Y
\S`X[^_^S_ZYT[`^__SZV[\\[^`aZ`W_
a``WV^SS`U_[^`WZZY[X`W`WUZ[[YWb[a`[ZUUWWSZ_`_YW``ZYS^VW^`[
VWZ`XcU`WUZ[[Y`[\WWZ`S`cU\[Z`Z`W
W Z`WZ_` [XUS\`S W\WZV a^W ^WSZ_YÌX[ WS\W Z SZV[ZY `W^
Wb[a`[Za`bS^ZYVWSZVSZV_a\\_VWXSU`[^_SW`S^V`[`S^YW``_
ZbW_`WZ` c` ZS [ZS ZX^S_`^aU`a^W\[UW_ _` S` `W c[^Z\^[Y^W__ _`SYW SZV
Wb[bWVY_\WWV\SUW`SUUW__ ^WYS^VWVTSZS_ _a\W^[^`[ X^[S
U[_`TWZWX`\[Z`[XbWcS`WS_`Z`WZWS^`W^
W `ZY [X `WUZ[[Y VWU_[Z_ _ S_[ USWZYZY SZV WS\X^[YYZY `WUZ[[Y
\S`X[^_T^ZY_T[`^__SZV[\\[^`aZ`W_
` [\W^S`[^_ SbZY S^WSV US\`SWV [Z `W^ [cSZYZY U[_`Ua``ZY
[\\[^`aZ W_`WZW cSbW[X^WVaU [Z_cTWS^VW `[SUWbW[\SZW_ZWWV`[
TSSZUW ZZ[bS`[Z SZV ^S`[ZSS`[Z `[ U[Z`^[ U[_`_ cW _a\\[^ ZY ^_ZY `^SXXU
b[aW_
`^WbWZaW_X^[WYSU_W^bUW__aUS_b[UW^WSZZY_`S`U[^WbWZXSZYSZV`W^WbWZaWYWZW^S`ZY\[`WZ`S[XZWc_W^bUW__`aZUW^`SZ[\W^S`[^_SbWZ[S`W^ZS`bW
Ta``[Ua`U[_`_X`WS^W`[YWZW^S`W`W^W`a^Z_`S`_S^W[VW^_VWSZV[^WS\WZWW^YZYS^W`__aUS_ZVS[`W^_SZS^W`_SZVWZ`^SSZVS_`W^Za^[\W
8/7/2019 Risk Management in Telecommunications
http://slidepdf.com/reader/full/risk-management-in-telecommunications 6/10
`WU[_`USWZYW_S^WWSUW^TS`WVTU[Z_aW^_SUZY`WV_\[_STWZU[WZWWVWV`[
_a\\[^`YW^bSaWYW^\^UWV_W^bUW_
WUZ[[YSZVSZV_W`VWbW[\W^_SbW_WWV`WZ`S`bWZZVa_` ZZ[bS`[Zc``WWU[_[\W^S`[^_Ua^^WZ`^WWYS`WV`[S_WU[ZVS^^[W[^WYSZ`WWSV[\W^S`[^_
ZWWV`[SW`W[_`[XW`W^ZS`SWZ`SZVZ`W^ZSS__W`_ZUaVZY^WS`W[US`[Z_WZ_`bWUa_`[W^VS`SWbUWSZaXSU`a^W^_SZV[ZZWS\\US`[ZVWbW[\W^_ÌSbW
_WWV`WZ`S`bWZ`WZZ[bS`[ZS^WZSWSbZY`WU[_^W_WTZY_\WU`S`[^_S_ZWc
`WUZ[[YUSZZ[bS`[Z_WW^YWZW[\W^S`[^_`WUZ[[YWSVW^__aUS_\\WSZV
[[YWV[Z[`XSUW^WbWZaWUSZZTSS [Z^__X^[ZZ[bS`[Z[U[_W`_ZZ[bS`[Z
YS\ [\W^S`[^_ZWWV `[ WZW^YW `W^ c[^X[^UW _ c ZUaVW \^[^ ZY SZV
^WS__W^`ZY`W^ST``[ZZ[bS`WX[^U[Z_aW^_
\W^S`[^_SbW_a^bbWVSZVWW^YWVX^[`WU^__S_S_SXWSbWZX[^ZbW_`[^_ÌTa`
`__`S`a__Z[`WZ[aY`[_a_`SZZbW_`[^_U[ZXVWZUWWU[_USZZ[[ZYW^^W[Z`W
_WU`[^_ VWXWZ_bW ZS`a^W SZV Z[c ZWWV `[ USZYW `W _`[^ X^[ _[^``W^ US_YWZW^S`[Z`[[ZYW^`W^Y^[c`SZVZZ[bS`[ZWc`_WS^Xa^`W^ZWYS`bWXSU`[^
_`S`US\WU^WW\_bWcWVS_ZWb`STWTZbW_`[^_YbWZ`WZWWVX[^`WZVa_`^`[
ZbW_` Z US\ SZ`WZ_bW \^[WU`_ _aU S_ _\WU`^a SU]a_`[Z SZV
\WWZ`S`[Z_
8/7/2019 Risk Management in Telecommunications
http://slidepdf.com/reader/full/risk-management-in-telecommunications 7/10
XXW^WZ`\S^`_[X`WTa_ZW__SbWVXXW^WZ`ZWWV_Z`W^_[X__`W_SZV\^[UW__W_SZV
WXXWU`bWSZSYWWZ`[X`WWYSUTa_ZW__S_TWU[WWbWZ[^W\[^`SZ`Z`WcSW
[X`WU^__Wc\S`X[^_SZV\[UW_`[_a\\[^`T[`WYSU_W^bUW_SZVZWc[XXW^ZY_[^[VW_S^WWSZV`S`SZSYZY`WWYSUS^WS_[X`WTa_ZW__[^WWXXWU`bWS_
TWU[WWbWZ[^W\[^`SZ`Z`WcSW[X`WU^__
a^^WZ`ZVa_`^VZSU_S^WXSb[^ZYbS^[a_X[^_[XZ[^YSZUW\SZ_[Z^SZYZYX^[
^WbWZaW_S^ZY\S^`ZW^_\_`[XaZU[aZ`^U[Z_[VS`[Z\W^S`[^_ZWWV`[VWbW[\
ZWc U[\W`WZUW_ SZV V_U ZS`W UWS^ TW`cWWZ_`aS`[Z_ ^W]a ZY\S^`ZW^_\ [^
SZ[X`WUS^SU W^_`U_[X`[VS_`WWU[_ZVa_` ÌZUaVZYZ`WZ_XZYZS^W U[\W [Z SZV U[_ \^W__a^W_ SZV `W ZWWV X[^ S[^ ZbW_`WZ Z ZWc
ZX^S_`^aU`a^WÌS^WV^bW^_[XZ[^YSZUY^[c`W`W^TaZVW^`SZYXaT[cZ[^
X[^ZY_`^S`WYU\S^`ZW^_\_
W^__S^[aZV\S^`ZW^_\_S^WTWZYU[\[aZVWVT`WcVWZZYS^^S[X_`^aU`a^W_
SZV[TWU bW_ Zb[bWV ZUaVZY ZW`c[^_S^ZY VWS_ c` [`W^ [\W^S`[^_ ^WbWZaW
_S ZY c` U[Z`WZ` SZV S\\US [Z [cZW^_ Z_[a^UZY [X US\ST W_ S_ ZVa_`^
a``W_SZV[a`_[a^UZY`[_\WUS_``^V\S^`W_
W VWbW[\WZ`[X `W VY`S_[UW`S_[a`\SUWV `W ST` `[_a\W^b_W ` SZV ZWc
Ta_ZW__[VW_S^WT^ZYZYZWc`^WS`_`[`W`WWU[_ZVa_`^ WUa^`U[ZUW^Z_bS^
TUa_`[W^SZV[\W^S`[^_S^WaZVW^\^W__a^WX^[Y[bW^ZWZ`SYWZVS_WZWWV`[
^Wb_` `W US__XUS`[Z SZV _WZ_`b` [X Ua_`[W^ VS`S [aY `W ZS`a^W [X `W
ZVa_`^WSZ_\^bSUSZV_WUa^``^WS`_S^WWZVWU_W^bUWZZ[bS`[ZSZVUSZYZYTa_ZW__ [VW_ _aU S_ WT SZV b^`aSS [Z S^W T^ZYZY ZWc `\W_ [X `^WS`_
[US`[Z_WZ_`bWVS`S_a\\[^`_SVTS_WV^WbWZaW[VW_Ta`USZSXXWU`Ua_`[W^\^bSU
Z `W \ SU X^[Z` VY`S ^Y`_ S^W SZ W[ bW __aW VaW `[ `W _[U[WU[Z[U
\US [Z_ SZV SZSYZY ^__ S^[aZV U[W^US U[Z`WZ` _ U[\US`WV T `WZb[bWWZ`[Xa`\W_`SW[VW^_
8/7/2019 Risk Management in Telecommunications
http://slidepdf.com/reader/full/risk-management-in-telecommunications 8/10
\W_[X^__
[W^US_
WbWZaWYWZW^S`[Z[VW
SZZTS_S`[Z[XW_`ZYS\\US`[Z_
[c\WZW`^S`[ZWbW_
[^T`SZ`^[SZYUS^YW_
O WZWX`_[\W^S`[^_SbWSZWVYWX[^VW\[WZ`
O W^S\\US`[Z_
VW[`WW\[ZSZVa_UV[cZ[SV
Y]aS`U^WS`ZY[UZ
O WYaS`[^W]a^WWZ`_
UWZ_ZY
S\\^[bZY_
W^bUWWbWSY^WWWZ`_
[Z`WZ`^WYaS`[Z[XU[Z`WZ`
WUa^`
U[W^UW
W__[ZSUZY
\Sb^a_SZVc[^S``SU_
O _W^_Z[`WWZ`[a\Y^SVW`[YWZVS\\US`[Z_
O [ST[^S`bW^^SZYWWZ`_ZVa_`[cW^_cZV[cZ`[`WZ`W^ZSc[^ZY_
O ^WXW^^WV[bW^ZWZ`SW^_SZV
O [^WYZZ`^SZ`_ZS[TWaSU[
O UW__bW^UZY^UW_ZWWV`[TW_W`SX`W^US^WXa_`aVZYU[\W``[Z
O ZU[\W`W`_S`[Z[XWS`a^W_WV^bW^_X[^YZ[`a`WV
O bSST`[X[\WWZ`S^__W`_
ÈVaSTSZVWZSTWVSZV_W`_
\\^[\^S`WZW`c[^SZV_[X`cS^WZX^S_`^aU`a^W
8/7/2019 Risk Management in Telecommunications
http://slidepdf.com/reader/full/risk-management-in-telecommunications 9/10
WUZ[[Y_
ZVW^ZY`WUZ[[YSZVVS
W`YWZW^S`[ZZW`c[^_
S S
O WS\W^_\WU`^a
O XXUWZUW_SZVTWZWX`_
O [c\^UWWZ`^
O [bW^ZWZ`XSb[a^
O YWS^ZYa\
T ZX^S_`^aU`a^WS_W_`S`[Z_SZV`^SZ___[ZZW`c[^_
U S^WVXX[^`_
V W`c[^SZSYWWZ`U[\W`
S \\US`[Z_T [Z`^[
U UUW__
ZSZUS_
S \WU`^aS[US`[ZYUWZ_ZYXWW[^W_WS[cWVWS\W^^S`WX[^
T `^ZYWZ`^WYaS`[^^W]a^WWZ`
U ZSZUZY
V ZY[XU[Z_`^SZ`_
[c`[\W^X[^_SZSYWWZ`
O WX[^S [Z[X S_SZSYWWZ`[` WW[^[aZUc`Sa`[ `V^ScZ
X^[ `W WU`[ WZW^S W\^W_WZ`S`bW_ X^[ S S^WS_ [X `W Ta_ZW__
ZW`c[^_ _SW_ÈS^W ZY ZX[^S [Z __`W_ ^WS W_`S`W S_ cW S_ `[_W
Z[^S S__[US`WV c` ^_ SZSYWWZ` XZSZUW WYS SZV \W^_[ZZW SZV
[^YSZ_S`[Z W Z[a_W X^W _SXW` SZV _WUa^` XaZU`[Z_ c[aV S_[ TW
Zb[bWVS_cWS_`W^_SZSYWWZ`SZVZ_a^SZUWVW\S^`WZ`W\^S^^[W _ `S` [X ^_ VWZ`XUS`[Z SZV WbSaS`[Z TS_WV [Z S `[`S U[_ [X ^_
U[ZUW\`
O W ^_ SZSYWWZ U[``WW c[aV TW ^W_\[Z_TW X[^ `W \^W\S^S [Z [X
^WWbSZ`U[\SZ_`SZVS^V_\^SU`UW_SZV\^[UWVa^W_W_W_[aV^WXWU`S^_
^SZZY[^ Y^SVZYW`[V[[Y\S^`UaS^cW^W S__W \^[`WU [Z _ Zb[bWV
8/7/2019 Risk Management in Telecommunications
http://slidepdf.com/reader/full/risk-management-in-telecommunications 10/10
_ c U[TZW _WbW^` X^W]aWZU SZV S_[ `W Ta_ZW__ \SU ^WXW^^WV `[
ST[bWZ[^VW^`S``WU[Z`^[_\a`Z\SUWS^W^WWbSZ`SZVS\\^[\^S`W
O ^SZZYSZVZ_`^aU`[Z[X_`SXXcTWW__WZ`SS`[USWbWZ[^VW^`[^WVaUWZ[`
[Z`WYX^W]aWZUÈ[c_WbW^`ZUVWZ`cUUSZTWVWZ`XWVTSZSZS__
[X `W U[\SZ_ [cZ W\W^WZUW SZV ZU[^\[^S ZY ZS`[ZS [^ Z`W^ZS [ZSW\W^WZUW Ta` S_[ `[ WZ_a^W `S WS_a^W_ \a` Z \SUW `[ U[Z`^[ \[`WZ`S
US`S_`^[\W ^__ S^W Z[ ZWYS`WV T \[[^ [US \^SU`UW_ [^ U[aZUS [Z_
_`W__[aV^WXWU``WSZSYWWZ`[X`W^_S_cW\a^W\_USS_\WU`_
cUSTWTW[ZV[USU[Z`^[
O ZVW^`SZY^WY[ZSÈZS`[ZSSaV`_ `[ WZ_a^W `S`\^SU`UW_SZV\^[UWVa^W_S^W
TWZY\WWZ`WV^WSZbSVSZVS_[U[Z`ZaW`[^WXWU``W`^aW^_Y^SVZY
[X `W XSU` ^SZZY SZV Z_ ^aU [Z X[^ `W _`SXX `[ aZVW^`SW `W_W SaV`
\^[UWVa^W_ _ S_[ S \^W^W]a_`W S U[^\[^S`W WbW S^__ Z`W^ZS`[ZS
W\W^WZUWc[aVS___`ZW_`ST_ZYTWZUS^_`[WZ_a^WU[\SZ_`SZVS^V_^WXWU``WZVa_`^
O `_ZYS^_Y^SVZYS\\^[SUSZV`_SaV`[X^_SZSYWWZ`[ZS^WY[ZS[^
SXaZU`[ZSVW\S^`WZ`WbWUSZTWZU[^\[^S`WVZ`[S\^WaS\\[^`[ZWZ`
[VWZ[^VW^`S``[_Wc[WXXWU`bWSZSYW^_USZTW^WU[YZ_WV