In addition to the healthcare risk posed by the current

In addition to the healthcare risk posed by the current COVID-19 pandemic, significant cyber and information security threats are increasing. These global threats impact organizations and individuals. You’ve been asked to complete some research for the healthcare domain that would like more information about the top security threats and attack methods related to COVID-19 that are targeted at healthcare organizations, employees, and patients. This risk analysis, prepared for a potential client, will include a risk register.

To prepare your risk analysis, complete the Risk Register Template by identifying the top 5 healthcare information security threats and attack methods related to pandemics, based on research from at least 2 peer-reviewed journal articles.

Write a 1- to 2-page narrative of your findings that could be presented to the CIO of a healthcare organization. The goal is to raise executive awareness resulting in improved executive decision-making, implementation of recommendations, identification of opportunities, allocation of budget, and allocation of resources.

Include your risk register in your narrative, and do the following:

  • Describe the focus of the analysis, including the systems that are used.
  • Justify your risk ranking of the top 5 threats.
  • Analyze the resource requirements and relationships to other processes.
  • Recommend organizational and security-related actions that would eliminate or mitigate the risk and impact on the organization.
  • Discuss any opportunities created by the presence of the risk.
  • Summarize your key findings.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Unit I Article Critique Instructions Attached is the ARTICLE and

Unit I Article Critique Instructions Attached is the ARTICLE and ARTICLE CRITIQUE EXAMPLE Read the article “Key Trends in Workforce Management and New Challenges for HR.” located in the Business Source Complete database of the CSU Online Library by clicking the link below:Moschetto, M. (2014, Winter). Key trends in workforce

Assessment Type Assessment -02 (Project) Time allowed Due Date Location

Assessment Type Assessment –02 (Project) Time allowedDue Date Location AHIC Term / YearUnit of CompetencyNational Code/Title BSBPEF501 Manage Personal and Professional DevelopmentStudent DetailsStudent Name Student IDStudent Declaration: I declare that the work submitted ismy own, and has not been copied or plagiarised from anyperson or source.Signature: ____________________________Date: _____/______/__________Assessor DetailsAssessor’s NameRESULTS

“The Train to Pakistan”

 Book review on “The Train to Pakistan” by Khuswant Singh. Tell what the novel is about (in this case the consequences of British India’s partition and into two countries India and East/West Pakistan. Indicate what the book is about and what it might mean to a reader (by explaining what

Regulation for Nursing Practice Staff Development Meeting

 Assume that you are leading a staff development meeting on regulation for nursing practice at your healthcare organization or agency. Review the NCSBN and ANA websites to prepare for your presentation. The Assignment: (9- to 10-slide PowerPoint presentation) Develop a 9- to 10-slide Voice-Over PowerPoint Presentation that addresses the following: 

1. Find a news article where a worker/person was seriously

 1. Find a news article where a worker/person was seriously injured or killed accidentally from hazardous chemicals and post the news article link. 2. answer the following questions:  Who was at fault for the incident occurring? Could this event have been possibly prevented and how? What lessons could be learned

You are the webmaster for the Republican Party National Committee.

You are the webmaster for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider: Who is likely to attack your site? When are attacks likely to occur? What sort of attacks might take place? How can you best minimize attacks and protect the

Choose a website that would be a possible resource for

Choose a website that would be a possible resource for a business report and evaluate it on the credibility and trustworthiness of its information. Use the following questions for your evaluation:  What person or organization sponsors the site?  What credentials do the author or authors have?  Does the site give

Project Overview You have been retained by Widget Sales Company

  Project Overview You have been retained by Widget Sales Company (for more information, see Widget Sales Company Project Overview [DOCX]), an international company with offices in 25 countries, to develop a website that will allow its employees to enter travel expenses incurred on a business trip and store that

Some people believe that poor writing in a peer-reviewed paper

 Some people believe that poor writing in a peer-reviewed paper is a reflection on the writer. Others believe it is a reflection on the journal and its editors. What are your thoughts? Why?  Book reference: Greene, S., & Lidinsky, A. (2018). From inquiry to academic writing: A practical guide (4th

Commonly, because of inadequate honors on Windows PCs you could

   Commonly, because of inadequate honors on Windows PCs you could wind up with different issues, of which one is Sage mistake 1925. It basically happens while you attempt to introduce Sage or other programming on your Windows PC. At the point when it happens, the accompanying mistake message shows

Consider the following scenario: Chris is the health care administrator

Consider the following scenario: Chris is the health care administrator for Health Innovations South, a large network of regional hospitals and care centers that provide direct patient care and engage in health research. In a recent market analysis, Chris discovered that Health Innovations South is ranked among the lowest 25%

Encryption It is common in today’s environment for healthcare providers

  Encryption It is common in today’s environment for healthcare providers and patients to use email or texting to communicate with each other. Prepare a procedure on secure messaging. What are the key components of the federal regulation 45 CFR Part 170.314(e) (3) Secure messaging? Include a summary of what

Questions 1) What are the purposes of offenders’ cognitions? Just

 Questions 1) What are the purposes of offenders’ cognitions? Just to make themselves feel better or to balance their interactions with others and their environments? 2) How can offenders’ childhood traumas influence their distorted cognitions of social reality? 3) What is the psychological source of mental conflicts? 4) How does prejudice

Mention some common barriers or challenges a DNP scholar may

 Mention some common barriers or challenges a DNP scholar may experience during project implementation and the strategies to overcome them. Why are strategies for overcoming barriers crucial to developing a DNP project?  Your post will be checked in Turnitin for plagiarism. Responses should be a minimum of 250 words, scholarly

How important are reference groups to the purchase of the

Answer the following questions using: (a) shoes, (b) barbecue grill, (c) car, (d) toaster, (e) iPad, and (f) adopting a pet from a shelter.  Questions: 1. How important are reference groups to the purchase of the above-mentioned products or activities? Would their influence also affect the brand or model? Would their influence