Healthcare Information Security Risk Analysis? In addition to the health care risk posed by the current COVID-19 pandemic, significant cyber and
Healthcare Information Security Risk Analysis
In addition to the health care risk posed by the current COVID-19 pandemic, significant cyber and information security threats are increasing. These global threats impact organizations and individuals. You have been asked to research the top security threats and attack methods related to COVID-19 that are targeted at health care organizations, employees, and patients. This risk analysis, prepared for a potential client, will include a risk register.
Create a risk analysis for a potential health care organization. To prepare your risk analysis, complete the Risk Register template (Attached) by identifying the top 5 health care information security threats and attack methods related to the pandemic based on research from at least two peer-reviewed journal articles.
Write a 2-3 page narrative of your findings that could be presented to the CIO of a health care organization. The goal is to raise executive awareness resulting in improved executive decision-making, implementation of recommendations, identification of opportunities, and allocation of resources for security. Include your risk register in your narrative, and do the following:
- Describe the focus of analysis, including the systems that are used.
- Justify your risk ranking of the top five threats.
- Analyze the resource requirements and relationships to other processes.
- Recommend organizational and security-related actions that would eliminate or mitigate the risk and impact on the organization.
- Discuss any opportunities created by the presence of the risk.
- Summarize your key findings.
Format your citations per APA guidelines.
Submit your narrative.
CMGTCB/559 v1
Title
ABC/123 vX
Page 2 of 2
Risk Register
Instructions
Complete the risk register template by identifying the top 5 healthcare information security threats and attack methods related to pandemics, based on research from at least 2 peer-reviewed journal articles.
Note: Include this table in your narrative
Risk 1: |
Risk 2: |
Risk 3: |
Risk 4: |
Risk 5: |
|
Risk Rank |
|||||
Risk Description |
|||||
Source, Threat or Risk driver |
|||||
Likelihood |
|||||
Organization Impact |
|||||
Risk Response |
|||||
Owner |
|||||
Opportunity |
|||||
Key Risk Indicators |
References
Copyright 2020 by University of Phoenix. All rights reserved.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
