risk management in telecommunications

10
-,-@ ¾ @n¯¾°¾¾°f°n [\U_SZSYWWZ`ZWWU[aZUS`[Z_ -@ °9¯ff©f°°f° 9° fn°f° °fff ,f°9f¾

Upload: singhrachanabaghel

Post on 09-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Risk Management in Telecommunications

8/7/2019 Risk Management in Telecommunications

http://slidepdf.com/reader/full/risk-management-in-telecommunications 1/10

-,-@

f¾¾

@n¯¾°¾¾°f°n

[\U_SZSYWWZ`ZWWU[aZUS`[Z_

-@

°9¯ff©f°°f°

f°f½

9°f°f°

fn°f°

°fff

,f°9f¾

Page 2: Risk Management in Telecommunications

8/7/2019 Risk Management in Telecommunications

http://slidepdf.com/reader/full/risk-management-in-telecommunications 2/10

_SZSYWWZ`ZWWU[aZUS`[Z_

_ [\W^S`[^_ c ^_ SZSYW S SZ [\W^S`[ZS WbW T `W VW_YZ [X `WW\[ZW

ZW`c[^_ Z[^VW^ `[\^[bVW S ^WSTW_W^bUW `[ `_ Ua_`[W^_SZV SVV^W__ U[[Z

VWZ`XSTW `^WS`_ _aU S_ X^W _SXW` SZV _WUa^` __aW_ ` __WWZ `S` \^[UWVa^W_ [^_`SZVS^V_S^W[X`WZS\\WV[ZSTSZW`TS__^^W_\WU`bW[X`WWbW[X^_\^W_WZ`WVZ[^

V[ `W_W ^WXWU` W\W^WZUW W`W ZS [ZS[^ Z`W^ZS`[ZS_ WSZ_ `S` _US^UW

^W_[a^UW_S^W[X`WZVa`WVWSbZYU^`USS^WS_[X`WTa_ZW__aZVaW\[_WVc_`W__

\[^`SZ`XSU`W_WZ[WZbSTWWbW_[XS``WZ`[ZWS_`[S___`Z`S^YW ZY^_

SZSYWWZ``[\^[VaUW`W[_`WXXWU`bWU[Z`^[[X^_c`Z`WU[\SZ

Z[^VW^`[U[WZUW`W\^[UW__[X^_SZSYWWZ``_XW``S`SU[\SZZWWV_`[

S__W__ `W ^WS`bW W[[V SZV \SU [X S _W^W_ [X `^WS`_ `[ `_ Ta_ZW__ _ _

TWUSa_W`_`W_W^bUW_`S``WU[\SZ\^[bVW_`S`_`W\[^`SZ`__aW^S`W^

`SZSU ZY S_Ua_`[VSZ [XS U[Z_VW^STWS__W`TS_W__aUSZ WbSaS`[Z[X \SU`

a_ ZUaVW SZ S__W__WZ` [X `[_W WXXWU`_ cU [X`WZ USZZ[` TW WS_a^WV Z UWS^

XZSZUS`W^_a_`[W^U[ZXVWZUW`W[\Z[Z_[XWY_S`[^_`Wa_WSVW[XZUVWZ`_

T U[\W``[^_ S^W _[W [X `W ^SZYW [X _[US U[W^US \[`US SZV [UUS_[ZS

ZS`[ZS_WUa^`__aW_cUa_`TWU[Z_VW^WV

WU[\SZ_[aV_W``_[cZaVYWWZ`U^`W^S^S`W^`SZX[[c`[_W\[_WVTSZ

W`W^ZSSa`[^`_aUS_Z_a^W^_c[ca_aSX[Ua__[W[Z`WXZSZUS[__`_

\[^`SZ`cWZTSSZUZYU[_`[X^_c``WU[_`[X^_^WVaU`[ZWS_a^W_ `S``W

`^aW\U`a^W_a_WVZSZVWU_[ZSZY\^[UW__W^W`WU[\SZSbW_WXZ_a^WV^__ `W c ZWWV `[ WbSaS`W `W `[`S U[_ `[ WZ_a^W `W ^_ U[Z`^[ WS_a^W_ [^

SUUW\`SZUWWbW_S^WT[`S\\^[\^S`WSZVWXXWU`bW

ZSUU[^VSZUWc``W^S\VY^[c``S`S_TWWZ_WWZZ`WZVSZWWU[ZVa_`^`W

W^_XSU`[^_X[^`WbS^[a_\SW^_SbWS_[`^SZ_X[^WV_YZXUSZ``_TWWbWV

`S``WUSZYW_Z`W`WWU[ZVa_`^_XaZVSWZ`S_SbWWV`[SZ\^[bWWZ`Z`W

U^WV`^_\^[XW[X`WZVa_`^S_Sc[W

W [\ a_ZW__ __ Z `W WWU[ ZVa_`^  S TW

VbVWVZ`[]aSV^SZ`_S_

S `^S`WYU`^WS`_Ì^WS`WV`[Ua_`[W^_U[\W``[^_SZVZbW_`[^_

T [\SZUW `^WS`_ Ì [ YZS`ZY Z \[`U_ Sc ^WYaS`[Z [^ U[^\[^S`W

Y[bW^ZSZUW

U \W^S`[ZS`^WS`_ÌSXXWU`ZY`W\^[UW__W___`W_\W[\WSZV[bW^SbSaW

V ZSZUS`^WS`_Ì_`WZYX^[b[S``ZS^W`_SZV`W^WSWU[Z[

Page 3: Risk Management in Telecommunications

8/7/2019 Risk Management in Telecommunications

http://slidepdf.com/reader/full/risk-management-in-telecommunications 3/10

WWU[_[\W^S`[^_Z[c_S^W`W^Ua_`[W^_c`[`W^\SW^_ZT[``WU[Z_aW^

SZVWZ`W^\^_WS^W`_WW`[^WW_`ST_ZY[cZW^_\_USZYZY`WUa_`[W^_

ZV_W ST[a` `W bSaW [X `W ZW`c[^ `^[aY UWS U[aZUS`[Z SZV ^S`W_

ZUSZYWVS`ZaTW^

SZWZ`W^\^_WUa_`[W^_Z[cZ[[ZYW^US^WX`WTa`W^`WWU[__W^bUW_X^[S`^SV`[ZS [\W^S`[ [^ _[W[ZW W_W ZV `W T^SZV bSaW [X `W WSVZY `WUZ[[Y

\SW^_`\US[a`_`^\_`S`[X`WWSVZY`WWU[_U[\SZW_

WSZcWSZZ`WZ_XZYU^[___WU`[^TS``W_aZVW^cSX[^`W[S`SZVWZYSYWWZ`

[X [\W^S`[^_ Ua_`[W^_ S^`\[ZW a_W^_ X[^ WS\W VWZ`X _`^[ZY c` VWbUW

SZaXSU`a^W^T^SZV_S_S^WS_[Z`[_c`U[\W^S`[^__WcW^WUSTW\SW^_S^W_`^[ZY

Page 4: Risk Management in Telecommunications

8/7/2019 Risk Management in Telecommunications

http://slidepdf.com/reader/full/risk-management-in-telecommunications 4/10

\[_ [ZWV `[ cZ Z `W TS``W X[^ `W `^\W\S Ua_ [W cW S ZWc cSbW [X cWT

S\\US`[Z_U[Z`ZaW_`[aZVW^ZWWYSUb[UWSZVVS`S_W^bUW_

`[SZSYW `W ^__S^[aZVUa_`[W^[cZW^_\ WXXWU bWSZV _a_`SZST `W W X[^

[\W^S`[^_ c TW `[ WZYZWW S USZYW Z Ua_`[W^_ ZV_W` `[ ^WXWU` `W ^WS SZV

_aT_`SZ`S U[Z` Ta`[ZSVW T `WWU[_ U[\SZW_ `[ `W [bW^S _W^bUWW\W^WZUWW``ZY`_W__SYWSU^[__c^W]a^WUWS^SZVU[Z__`WZ`U[aZUS`[Z[Z`WbSaW

[X`WZW`c[^SZV[ZcS```SW_`[\^[bVWY]aS`_W^bUW_

WU[_ SbW aZ]aW US\ST`W_ _aU S_ `W TZY SZV \SWZ` WZYZW_ SZV `W^

Ua_`[W^ ZX[^S`[ZS__W`_^WbWSS `\W[X WZVa_W^[cZW^_\`S`S_W `[TW Xa

W\[`WVW`W^T`W_WbW_[^`^[aY`^V\S^`W_

W`WZ`[Z_`^S`WYW_SbWSU`aSTWWZVW_`^[ZYbSaWc`TaZVWV[XXW^_ZXWVSZV

XS`^S`W[XXW^_ Z `W [TW S^W SbZY `W WXXWU [XcVWZZY\^[VaU`_U[\WS` `W

W\WZ_W [X \^[VaU` \^[X`ST` ` U[Z_aW^_ Z[c SZY Y^[cZY a_W [X [TW

Z`W^ZW`ZWcX[^_[X^WbWZaWUSZZTSS`[ZS^WaZVW^cS_aUS__aT_``a`[Z[XS

[aUSZWS`[TWVS`Sa_SYWX[^a_SYW\^UWV

ZSZUS_W_[\W^S`[^_Ua^^WZ`_`^S`WYW_X[^^W`SZZYUa_`[W^_S^WSU`aSVW_`^[ZY

bSaWX[^WS\WTcVWZZY\^[VaU`_U[\WS``WW\WZ_W[X^WbWZaWSZV\^[X`ST`

\W^S`[^_ZWWV`[^WSW`WXabSaW[XUa_`[W^_T^WU[YZZYSZVWbW^SYZY`W^

[cZ`^SZ_X[^S`bW\[cW^

SZ `WU[_ SbW S^WSV _`^WZY`WZWV `W^ X[Ua_ [Z Ua_`[W^ bSaW T ^W[^YSZZY

`W_WbW_S[ZYUa_`[W^ZW__aUS_U[Z_aW^SZVWZ`W^\^_WVb_[Z_^S`W^`SZ

`WUZ[[YZW__aUS_XWVSZV[TWWS^WS_[VWZ`XZYSZV`^ZY[a`ZWc

[VW__aUS__WZY_S^`\[ZWS\\US`[Z_Z^W`a^ZX[^S\^[\[^`[Z[X`W^WbWZaW_SZV ZZ[bS`ZY Z \S^`ZW^_\ c` VWbUW SZV S\\US`[Z VWbW[\W^_ `[ U^WS`W

VXXW^WZ`S`WVW\W^WZUW_

W`c[^ZWa`^S`_V[ZS`ZY`WY[TS^WYaS`[^SYWZVSSZV_cVWZZYZ`W `[ ZUaVW [TW _W^bUW_ Z \S^SW VbW^_W ^WYaS`[Z_ S^W Wb[bZY SU^[__ VXXW^WZ

_WYWZ`_ SZV Y[bW^ZWZ`_ S^W [[ZY `[ T[[_` `S ^WbWZaW_ W [bW^S ZWWV _ X[^

Y^WS`W^^WYaS`[^UW^`SZ`

_ USZYW [X X[Ua_ ^WXWU`_ `W ^_W [X ZW`c[^ ZWa` S` S_ `W V[ZSZ Y[TS

^WYaS`[^__aWZVW^`_U[ZUW\`[\W^S`[^_a_``^`[\^[bVWZW`c[^TSZVcV`[Z

SZW]aSTS__ `[SS\\US`[Z_ ^^W_\WU bW [X[c aU TSZVcV` WSU S\\US`[Z

Page 5: Risk Management in Telecommunications

8/7/2019 Risk Management in Telecommunications

http://slidepdf.com/reader/full/risk-management-in-telecommunications 5/10

U[Z_aW_ ` VS`S `^SXXU ^_ZY ZW[^ST SZV aZ\^WVU`ST ZW`c[^ ZWa`^S`

`^WS`WZ_`[aZVW^ZW `W UW^`SZ` [X XZSZUS ^W`a^Z`S`[\W^S`[^_ZWWV Z[^VW^ `[

S[US`W`WZW`cSbW[XZW`c[^US\W

[TW [\W^S`[^_ S^W _WWZY ^[SZY SZV `W^ZS [Z ^S`W ^WVaU [Z_ S_ cW S_ `W

\^[_\WU`[XZW`c[^ZWa`^S`XWV[\W^S`[^_S^WXSUZYXTW^^WYaS`[Z_aUS_ZW`c[^aZTaZVZY SZV VaU` SUUW__ SZV _W^bUW_ S^W XSUZY USWZYW_ S^[aZV U[Z`WZ

WUa_b`YW^WbW_[X_`S`W_a\\[^`USZU^WS`WZWc\^[TW_X[^Y[bW^ZWZ`__aU

S_VWS_ [bW^ cW`W^ `[ X[Ua_[Z U[_ZY `W VY S VbVW [^T[[_ ZY `W XS_ W_`

_\WWV_Z`WS^W`

VbSZUZY `WUZ[[Y SZV aZUW^`SZ ^W`a^Z_ WSZ [\W^S`[^_ XSUW ZWc U[UW_ SZV

U[Z_VW^S`[Z_Z`W^ZW`c[^US\W_`^S`WYW_SYSZ_`STSUY^[aZV[XWb[bZYZS`[ZS\[UW_W`ZY[XZbW_`WZ`_S_[U^aUSc`VWU_[Z_`[WS\X^[Y`WUZ[[Y

\S`X[^_^S_ZYT[`^__SZV[\\[^`aZ`W_

a``WV^SS`U_[^`WZZY[X`W`WUZ[[YWb[a`[ZUUWWSZ_`_YW``ZYS^VW^`[

VWZ`XcU`WUZ[[Y`[\WWZ`S`cU\[Z`Z`W

W Z`WZ_` [XUS\`S W\WZV a^W ^WSZ_YÌX[ WS\W Z SZV[ZY `W^

Wb[a`[Za`bS^ZYVWSZVSZV_a\\_VWXSU`[^_SW`S^V`[`S^YW``_

ZbW_`WZ` c` ZS [ZS ZX^S_`^aU`a^W\[UW_ _` S` `W c[^Z\^[Y^W__ _`SYW SZV

Wb[bWVY_\WWV\SUW`SUUW__ ^WYS^VWVTSZS_ _a\W^[^`[ X^[S

U[_`TWZWX`\[Z`[XbWcS`WS_`Z`WZWS^`W^

W `ZY [X `WUZ[[Y VWU_[Z_ _ S_[ USWZYZY SZV WS\X^[YYZY `WUZ[[Y

\S`X[^_T^ZY_T[`^__SZV[\\[^`aZ`W_

` [\W^S`[^_ SbZY S^WSV US\`SWV [Z `W^ [cSZYZY U[_`Ua``ZY

[\\[^`aZ W_`WZW cSbW[X^WVaU [Z_cTWS^VW `[SUWbW[\SZW_ZWWV`[

TSSZUW ZZ[bS`[Z SZV ^S`[ZSS`[Z `[ U[Z`^[ U[_`_ cW _a\\[^ ZY ^_ZY `^SXXU

b[aW_

`^WbWZaW_X^[WYSU_W^bUW__aUS_b[UW^WSZZY_`S`U[^WbWZXSZYSZV`W^WbWZaWYWZW^S`ZY\[`WZ`S[XZWc_W^bUW__`aZUW^`SZ[\W^S`[^_SbWZ[S`W^ZS`bW

Ta``[Ua`U[_`_X`WS^W`[YWZW^S`W`W^W`a^Z_`S`_S^W[VW^_VWSZV[^WS\WZWW^YZYS^W`__aUS_ZVS[`W^_SZS^W`_SZVWZ`^SSZVS_`W^Za^[\W

Page 6: Risk Management in Telecommunications

8/7/2019 Risk Management in Telecommunications

http://slidepdf.com/reader/full/risk-management-in-telecommunications 6/10

`WU[_`USWZYW_S^WWSUW^TS`WVTU[Z_aW^_SUZY`WV_\[_STWZU[WZWWVWV`[

_a\\[^`YW^bSaWYW^\^UWV_W^bUW_

WUZ[[YSZVSZV_W`VWbW[\W^_SbW_WWV`WZ`S`bWZZVa_` ZZ[bS`[Zc``WWU[_[\W^S`[^_Ua^^WZ`^WWYS`WV`[S_WU[ZVS^^[W[^WYSZ`WWSV[\W^S`[^_

ZWWV`[SW`W[_`[XW`W^ZS`SWZ`SZVZ`W^ZSS__W`_ZUaVZY^WS`W[US`[Z_WZ_`bWUa_`[W^VS`SWbUWSZaXSU`a^W^_SZV[ZZWS\\US`[ZVWbW[\W^_ÌSbW

_WWV`WZ`S`bWZ`WZZ[bS`[ZS^WZSWSbZY`WU[_^W_WTZY_\WU`S`[^_S_ZWc

`WUZ[[YUSZZ[bS`[Z_WW^YWZW[\W^S`[^_`WUZ[[YWSVW^__aUS_\\WSZV

[[YWV[Z[`XSUW^WbWZaWUSZZTSS [Z^__X^[ZZ[bS`[Z[U[_W`_ZZ[bS`[Z

YS\ [\W^S`[^_ZWWV `[ WZW^YW `W^ c[^X[^UW _ c ZUaVW \^[^ ZY SZV

^WS__W^`ZY`W^ST``[ZZ[bS`WX[^U[Z_aW^_

\W^S`[^_SbW_a^bbWVSZVWW^YWVX^[`WU^__S_S_SXWSbWZX[^ZbW_`[^_ÌTa`

`__`S`a__Z[`WZ[aY`[_a_`SZZbW_`[^_U[ZXVWZUWWU[_USZZ[[ZYW^^W[Z`W

_WU`[^_ VWXWZ_bW ZS`a^W SZV Z[c ZWWV `[ USZYW `W _`[^ X^[ _[^``W^ US_YWZW^S`[Z`[[ZYW^`W^Y^[c`SZVZZ[bS`[ZWc`_WS^Xa^`W^ZWYS`bWXSU`[^

_`S`US\WU^WW\_bWcWVS_ZWb`STWTZbW_`[^_YbWZ`WZWWVX[^`WZVa_`^`[

ZbW_` Z US\ SZ`WZ_bW \^[WU`_ _aU S_ _\WU`^a SU]a_`[Z SZV

\WWZ`S`[Z_

Page 7: Risk Management in Telecommunications

8/7/2019 Risk Management in Telecommunications

http://slidepdf.com/reader/full/risk-management-in-telecommunications 7/10

XXW^WZ`\S^`_[X`WTa_ZW__SbWVXXW^WZ`ZWWV_Z`W^_[X__`W_SZV\^[UW__W_SZV

WXXWU`bWSZSYWWZ`[X`WWYSUTa_ZW__S_TWU[WWbWZ[^W\[^`SZ`Z`WcSW

[X`WU^__Wc\S`X[^_SZV\[UW_`[_a\\[^`T[`WYSU_W^bUW_SZVZWc[XXW^ZY_[^[VW_S^WWSZV`S`SZSYZY`WWYSUS^WS_[X`WTa_ZW__[^WWXXWU`bWS_

TWU[WWbWZ[^W\[^`SZ`Z`WcSW[X`WU^__

a^^WZ`ZVa_`^VZSU_S^WXSb[^ZYbS^[a_X[^_[XZ[^YSZUW\SZ_[Z^SZYZYX^[

^WbWZaW_S^ZY\S^`ZW^_\_`[XaZU[aZ`^U[Z_[VS`[Z\W^S`[^_ZWWV`[VWbW[\

ZWc U[\W`WZUW_ SZV V_U ZS`W UWS^ TW`cWWZ_`aS`[Z_ ^W]a ZY\S^`ZW^_\ [^

SZ[X`WUS^SU W^_`U_[X`[VS_`WWU[_ZVa_` ÌZUaVZYZ`WZ_XZYZS^W U[\W [Z SZV U[_ \^W__a^W_ SZV `W ZWWV X[^ S[^ ZbW_`WZ Z ZWc

ZX^S_`^aU`a^WÌS^WV^bW^_[XZ[^YSZUY^[c`W`W^TaZVW^`SZYXaT[cZ[^

X[^ZY_`^S`WYU\S^`ZW^_\_

W^__S^[aZV\S^`ZW^_\_S^WTWZYU[\[aZVWVT`WcVWZZYS^^S[X_`^aU`a^W_

SZV[TWU bW_ Zb[bWV ZUaVZY ZW`c[^_S^ZY VWS_ c` [`W^ [\W^S`[^_ ^WbWZaW

_S ZY c` U[Z`WZ` SZV S\\US [Z [cZW^_ Z_[a^UZY [X US\ST W_ S_ ZVa_`^

a``W_SZV[a`_[a^UZY`[_\WUS_``^V\S^`W_

W VWbW[\WZ`[X `W VY`S_[UW`S_[a`\SUWV `W ST` `[_a\W^b_W ` SZV ZWc

Ta_ZW__[VW_S^WT^ZYZYZWc`^WS`_`[`W`WWU[_ZVa_`^ WUa^`U[ZUW^Z_bS^

TUa_`[W^SZV[\W^S`[^_S^WaZVW^\^W__a^WX^[Y[bW^ZWZ`SYWZVS_WZWWV`[

^Wb_` `W US__XUS`[Z SZV _WZ_`b` [X Ua_`[W^ VS`S [aY `W ZS`a^W [X `W

ZVa_`^WSZ_\^bSUSZV_WUa^``^WS`_S^WWZVWU_W^bUWZZ[bS`[ZSZVUSZYZYTa_ZW__ [VW_ _aU S_ WT SZV b^`aSS [Z S^W T^ZYZY ZWc `\W_ [X `^WS`_

[US`[Z_WZ_`bWVS`S_a\\[^`_SVTS_WV^WbWZaW[VW_Ta`USZSXXWU`Ua_`[W^\^bSU

Z `W \ SU X^[Z` VY`S ^Y`_ S^W SZ W[ bW __aW VaW `[ `W _[U[WU[Z[U

\US [Z_ SZV SZSYZY ^__ S^[aZV U[W^US U[Z`WZ` _ U[\US`WV T `WZb[bWWZ`[Xa`\W_`SW[VW^_

Page 8: Risk Management in Telecommunications

8/7/2019 Risk Management in Telecommunications

http://slidepdf.com/reader/full/risk-management-in-telecommunications 8/10

\W_[X^__

[W^US_

WbWZaWYWZW^S`[Z[VW

SZZTS_S`[Z[XW_`ZYS\\US`[Z_

[c\WZW`^S`[ZWbW_

[^T`SZ`^[SZYUS^YW_

O WZWX`_[\W^S`[^_SbWSZWVYWX[^VW\[WZ`

O W^S\\US`[Z_

VW[`WW\[ZSZVa_UV[cZ[SV

Y]aS`U^WS`ZY[UZ

O WYaS`[^W]a^WWZ`_

UWZ_ZY

S\\^[bZY_

W^bUWWbWSY^WWWZ`_

[Z`WZ`^WYaS`[Z[XU[Z`WZ`

WUa^`

U[W^UW

W__[ZSUZY

\Sb^a_SZVc[^S``SU_

O _W^_Z[`WWZ`[a\Y^SVW`[YWZVS\\US`[Z_

O [ST[^S`bW^^SZYWWZ`_ZVa_`[cW^_cZV[cZ`[`WZ`W^ZSc[^ZY_

O ^WXW^^WV[bW^ZWZ`SW^_SZV

O [^WYZZ`^SZ`_ZS[TWaSU[

O UW__bW^UZY^UW_ZWWV`[TW_W`SX`W^US^WXa_`aVZYU[\W``[Z

O ZU[\W`W`_S`[Z[XWS`a^W_WV^bW^_X[^YZ[`a`WV

O bSST`[X[\WWZ`S^__W`_

ÈVaSTSZVWZSTWVSZV_W`_

\\^[\^S`WZW`c[^SZV_[X`cS^WZX^S_`^aU`a^W

Page 9: Risk Management in Telecommunications

8/7/2019 Risk Management in Telecommunications

http://slidepdf.com/reader/full/risk-management-in-telecommunications 9/10

WUZ[[Y_

ZVW^ZY`WUZ[[YSZVVS

W`YWZW^S`[ZZW`c[^_

S S

O WS\W^_\WU`^a

O XXUWZUW_SZVTWZWX`_

O [c\^UWWZ`^

O [bW^ZWZ`XSb[a^

O YWS^ZYa\

T ZX^S_`^aU`a^WS_W_`S`[Z_SZV`^SZ___[ZZW`c[^_

U S^WVXX[^`_

V W`c[^SZSYWWZ`U[\W`

S \\US`[Z_T [Z`^[

U UUW__

ZSZUS_

S \WU`^aS[US`[ZYUWZ_ZYXWW[^W_WS[cWVWS\W^^S`WX[^

T `^ZYWZ`^WYaS`[^^W]a^WWZ`

U ZSZUZY

V ZY[XU[Z_`^SZ`_

 [c`[\W^X[^_SZSYWWZ`

O WX[^S [Z[X S_SZSYWWZ`[` WW[^[aZUc`Sa`[ `V^ScZ

X^[ `W WU`[ WZW^S W\^W_WZ`S`bW_ X^[ S S^WS_ [X `W Ta_ZW__

ZW`c[^_ _SW_ÈS^W ZY ZX[^S [Z __`W_ ^WS W_`S`W S_ cW S_ `[_W

Z[^S S__[US`WV c` ^_ SZSYWWZ` XZSZUW WYS SZV \W^_[ZZW SZV

[^YSZ_S`[Z W Z[a_W X^W _SXW` SZV _WUa^` XaZU`[Z_ c[aV S_[ TW

Zb[bWVS_cWS_`W^_SZSYWWZ`SZVZ_a^SZUWVW\S^`WZ`W\^S^^[W _ `S` [X ^_ VWZ`XUS`[Z SZV WbSaS`[Z TS_WV [Z S `[`S U[_ [X ^_

U[ZUW\`

O W ^_ SZSYWWZ U[``WW c[aV TW ^W_\[Z_TW X[^ `W \^W\S^S [Z [X

^WWbSZ`U[\SZ_`SZVS^V_\^SU`UW_SZV\^[UWVa^W_W_W_[aV^WXWU`S^_

^SZZY[^ Y^SVZYW`[V[[Y\S^`UaS^cW^W S__W \^[`WU [Z _ Zb[bWV

Page 10: Risk Management in Telecommunications

8/7/2019 Risk Management in Telecommunications

http://slidepdf.com/reader/full/risk-management-in-telecommunications 10/10

_ c U[TZW _WbW^` X^W]aWZU SZV S_[ `W Ta_ZW__ \SU ^WXW^^WV `[

ST[bWZ[^VW^`S``WU[Z`^[_\a`Z\SUWS^W^WWbSZ`SZVS\\^[\^S`W

O ^SZZYSZVZ_`^aU`[Z[X_`SXXcTWW__WZ`SS`[USWbWZ[^VW^`[^WVaUWZ[`

[Z`WYX^W]aWZUÈ[c_WbW^`ZUVWZ`cUUSZTWVWZ`XWVTSZSZS__

[X `W U[\SZ_ [cZ W\W^WZUW SZV ZU[^\[^S ZY ZS`[ZS [^ Z`W^ZS [ZSW\W^WZUW Ta` S_[ `[ WZ_a^W `S WS_a^W_ \a` Z \SUW `[ U[Z`^[ \[`WZ`S

US`S_`^[\W ^__ S^W Z[ ZWYS`WV T \[[^ [US \^SU`UW_ [^ U[aZUS [Z_

_`W__[aV^WXWU``WSZSYWWZ`[X`W^_S_cW\a^W\_USS_\WU`_

cUSTWTW[ZV[USU[Z`^[

O ZVW^`SZY^WY[ZSÈZS`[ZSSaV`_ `[ WZ_a^W `S`\^SU`UW_SZV\^[UWVa^W_S^W

TWZY\WWZ`WV^WSZbSVSZVS_[U[Z`ZaW`[^WXWU``W`^aW^_Y^SVZY

[X `W XSU` ^SZZY SZV Z_ ^aU [Z X[^ `W _`SXX `[ aZVW^`SW `W_W SaV`

\^[UWVa^W_ _ S_[ S \^W^W]a_`W S U[^\[^S`W WbW S^__ Z`W^ZS`[ZS

W\W^WZUWc[aVS___`ZW_`ST_ZYTWZUS^_`[WZ_a^WU[\SZ_`SZVS^V_^WXWU``WZVa_`^

O `_ZYS^_Y^SVZYS\\^[SUSZV`_SaV`[X^_SZSYWWZ`[ZS^WY[ZS[^

SXaZU`[ZSVW\S^`WZ`WbWUSZTWZU[^\[^S`WVZ`[S\^WaS\\[^`[ZWZ`

[VWZ[^VW^`S``[_Wc[WXXWU`bWSZSYW^_USZTW^WU[YZ_WV