Chat with us, powered by LiveChat In addition to the healthcare risk posed by the current COVID-19 pandemic, significant cyber and information security threats are increasing. These global threats impact organizations a - Writeden

In addition to the healthcare risk posed by the current COVID-19 pandemic, significant cyber and information security threats are increasing. These global threats impact organizations and individuals. You’ve been asked to complete some research for the healthcare domain that would like more information about the top security threats and attack methods related to COVID-19 that are targeted at healthcare organizations, employees, and patients. This risk analysis, prepared for a potential client, will include a risk register.

To prepare your risk analysis, complete the Risk Register Template by identifying the top 5 healthcare information security threats and attack methods related to pandemics, based on research from at least 2 peer-reviewed journal articles.

Write a 1- to 2-page narrative of your findings that could be presented to the CIO of a healthcare organization. The goal is to raise executive awareness resulting in improved executive decision-making, implementation of recommendations, identification of opportunities, allocation of budget, and allocation of resources.

Include your risk register in your narrative, and do the following:

  • Describe the focus of the analysis, including the systems that are used.
  • Justify your risk ranking of the top 5 threats.
  • Analyze the resource requirements and relationships to other processes.
  • Recommend organizational and security-related actions that would eliminate or mitigate the risk and impact on the organization.
  • Discuss any opportunities created by the presence of the risk.
  • Summarize your key findings.

Cite at least 2 peer-reviewed journal articles

Format your citations according to APA guidelines.

Submit your narrative.

CMGT/559 v1

Title

ABC/123 vX

Page 2 of 2

C:UsersdjshireyOneDrive - University of PhoenixF_DriveStyle GuidesUPX LogosHorizontal formatUOPX_Sig_Hor_Black_Medium.png

Risk Register

Instructions

Complete the risk register template by identifying the top 5 healthcare information security threats and attack methods related to pandemics, which should be based on research from at least 2 peer-reviewed journal articles.

Note: Include this table in your narrative

Risk 1:

Risk 2:

Risk 3: 

Risk 4:  

Risk 5:  

Risk Rank 

Risk Description 

Source, Threat or Risk driver 

Likelihood 

Organization Impact  

Risk Response 

Owner 

Opportunity 

Key Risk Indicators 

References

Copyright 2020 by University of Phoenix. All rights reserved.

Copyright 2020 by University of Phoenix. All rights reserved.

image1.png