Question: Risk Registry Create a Risk Registry using the template below to accurately documenting the risk elements form the scenarios that can be used to track
Risk Registry
Create a Risk Registry using the template below to accurately documenting the risk elements form the scenarios that can be used to track issues throughout the project.
| Risk Description for Risk Registry | Likelihood | Impact | Risk Owner | Resources Required | Estimated Completion Date |
| | | | | | |
| A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client Protected Health Information (PHI) allowing access to PHI stored within the database
|
|
|
|
|
|
| : An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized access to the PHI |
|
|
|
|
|
| An unauthorized access to client accounts through the companys login website via the cracking of weak passwords |
|
|
|
|
|
Security Assessment Plan Worksheet
Using the Assignment Scenario, complete the following worksheet.
| Description of Vulnerability | Security Control Number and Name | Security Control Type | System Categorization for Risk Level Impact | Last Assessment Information | Asset | Assessment Method | Policy Alignment |
| | | | | | | | |
| A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client Protected Health Information (PHI) allowing access to PHI stored within the database |
|
|
|
|
|
|
|
| An unauthorized access to client accounts through the companys login website via the cracking of weak passwords |
|
|
|
|
|
|
|
| An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized access to the PHI
|
|
|
|
|
|
|
|
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
