Question: Risk Registry Create a Risk Registry using the template below to accurately documenting the risk elements form the scenarios that can be used to track

Risk Registry

Create a Risk Registry using the template below to accurately documenting the risk elements form the scenarios that can be used to track issues throughout the project.

Risk Description for Risk Registry

Likelihood

Impact

Risk Owner

Resources Required

Estimated Completion Date

A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client Protected Health Information (PHI) allowing access to PHI stored within the database

: An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized access to the PHI

An unauthorized access to client accounts through the companys login website via the cracking of weak passwords

Security Assessment Plan Worksheet

Using the Assignment Scenario, complete the following worksheet.

Description of Vulnerability

Security Control Number and Name

Security Control Type

System Categorization for Risk Level Impact

Last Assessment Information

Asset

Assessment Method

Policy Alignment

A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client Protected Health Information (PHI) allowing access to PHI stored within the database

An unauthorized access to client accounts through the companys login website via the cracking of weak passwords

An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized access to the PHI

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!