CMGT/559 v1
Title
ABC/123 vX
Page 2 of 2
Risk Register
Instructions
Complete the risk register template by identifying the top 5 healthcare information security threats and attack methods related to pandemics, which should be based on research from at least 2 peer-reviewed journal articles.
Note: Include this table in your narrative
Risk 1: |
Risk 2: |
Risk 3: |
Risk 4: |
Risk 5: |
|
Risk Rank |
|||||
Risk Description |
|||||
Source, Threat or Risk driver |
|||||
Likelihood |
|||||
Organization Impact |
|||||
Risk Response |
|||||
Owner |
|||||
Opportunity |
|||||
Key Risk Indicators |
References
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.