RISK REGISTER : CYBER SECURITY LAB (KEYLOGGING SOFTWARE). Please add 3 more risks. Intructions: please see below. 1) Have your team identify the top 5-10 risks for your project (i.e. one of the computers don't work, the electrical system is overloaded when all the computers are on, a component of one of the computers is misplaced or stolen, etc.). 2) Label each of these risks (R1, R2, R3, etc. 3) Identify the Probability/Risk (Likelihood/Consequence) for each of these. 4) Rate each risk as HIGH, MEDIUM, or SMALL. 5) Identify who is responsible for the risk. 6) Identify the steps you will incorporate to mitigate the risk (lessen the risk). please write following the table given in the image.
RISK REGISTER : CYBER SECURITY LAB (KEYLOGGING SOFTWARE). Please add 3 more risks.
Intructions: please see below.
1) Have your team identify the top 5-10 risks for your project (i.e. one of the computers don't work, the electrical system is overloaded when all the computers are on, a component of one of the computers is misplaced or stolen, etc.).
2) Label each of these risks (R1, R2, R3, etc.
3) Identify the Probability/Risk (Likelihood/Consequence) for each of these.
4) Rate each risk as HIGH, MEDIUM, or SMALL.
5) Identify who is responsible for the risk.
6) Identify the steps you will incorporate to mitigate the risk (lessen the risk).
please write following the table given in the image.
Trending now
This is a popular solution!
Step by step
Solved in 3 steps