RISK REGISTER : CYBER SECURITY LAB (KEYLOGGING SOFTWARE). Please add 3 more risks.  Intructions: please see below.  1) Have your team identify the top 5-10 risks for your project (i.e. one of the computers don't work, the electrical system is overloaded when all the computers are on, a component of one of the computers is misplaced or stolen, etc.).

icon
Related questions
Question

RISK REGISTER : CYBER SECURITY LAB (KEYLOGGING SOFTWARE). Please add 3 more risks. 

Intructions: please see below. 

1) Have your team identify the top 5-10 risks for your project (i.e. one of the computers don't work, the electrical system is overloaded when all the computers are on, a component of one of the computers is misplaced or stolen, etc.).

 

Risk #
R1
R2
R3
Risk
Description
Flawed data can
slow successful
completion of
tasks
need to build
protective and
resilient system
Poor quality
equiptment
Category
Time /task
management
Cloud/network
security
Quality
Relationships
Root Cause
Multiple source
of information
Needing
resouces from
other group or
department
No quality
check, low
quality
distributer,
cheap parts
used
Triggers
Having a small
window
between
deadlines of
different tasks.
Not ordering
from
established
distributer
Risk Owner
Unprotected
senitive user Project team / IT
information
Personnel not
Project team
Joseph
Probability
50.00%
60.00%
30%
Impact
Medium
Medium
Hgh
Mitigation
Use a requirement
management tool.
Have an alternative
network security solution
readily available
Conduct thorough
analysis of company to
purchase from, conduct
quality check prior to
using and setting up
devicess
Risk Rank
(1-5=highest)
2
3
5
Status
In progress
In progress
In progress
Transcribed Image Text:Risk # R1 R2 R3 Risk Description Flawed data can slow successful completion of tasks need to build protective and resilient system Poor quality equiptment Category Time /task management Cloud/network security Quality Relationships Root Cause Multiple source of information Needing resouces from other group or department No quality check, low quality distributer, cheap parts used Triggers Having a small window between deadlines of different tasks. Not ordering from established distributer Risk Owner Unprotected senitive user Project team / IT information Personnel not Project team Joseph Probability 50.00% 60.00% 30% Impact Medium Medium Hgh Mitigation Use a requirement management tool. Have an alternative network security solution readily available Conduct thorough analysis of company to purchase from, conduct quality check prior to using and setting up devicess Risk Rank (1-5=highest) 2 3 5 Status In progress In progress In progress
Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer