CMGT/559 v1
Title
ABC/123 vX
Page 2 of 2
Complete the risk register template by identifying the top 5 healthcare information security threats and attack methods related to pandemics, which should be based on research from at least 2 peer-reviewed journal articles.
Note: Include this table in your narrative
Risk 1: | Risk 2: | Risk 3: | Risk 4: | Risk 5: | |
Risk Rank | |||||
Risk Description | |||||
Source, Threat or Risk driver | |||||
Likelihood | |||||
Organization Impact | |||||
Risk Response | |||||
Owner | |||||
Opportunity | |||||
Key Risk Indicators |
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.