Posted: September 19th, 2022

Report Continue

 Please follow the to do word document and Risk assessment.

 *** Here is the topic I have selected risk assessment report on the Healthcare system for Report 1. This is a tier 3 assessment***  Please continue on Report 1 doc. Please make sure to review the todo word document.


This assignment is intended to help you learn to do the following:

· Describe the purpose of the risk assessment

· Identify assumptions and constraints.

· Describe risk tolerance inputs to the risk assessment

· Identify and describe the risk model and analytic approach

· Provide a rationale for risk-related decisions during the risk assessment process.

· Describe the uncertainties within the risk assessment process and how those uncertainties influence decisions.


Complete Part 1 of the “Body of the Report” section of your report. Follow the guidance in the Risk Assessment Reports Template when writing your report.

Use Library to find scholarly sources for information and support; use them where applicable. Use APA citation style for your report. All sources consulted must be appropriately cited. The 

Purdue OWL APA Formatting and Style Guide (Links to an external site.)
 is an excellent resource for this.

Action Items

1. Read 
Body of the Report: Part 1 in the Risk Assessment Reports Template.

2. Conduct research as needed to obtain information and support.

3. Complete Part 1 of the Body of the Report section of your report according to the 

Risk Assessment Reports Template


Grading Criteria

Read the assignment rubric to understand how your work will be assessed.


Risk Assessment Report 2




Risk Assessment Reports

Template Name: ______________

Risk Assessment Reports

This risk assessment report, adapted from NIST’s Special Publication 800-30, provides the essential elements of information that organizations can use to communicate the results of risk assessments. Risk assessment results provide decision makers with an understanding of the information security risk to organizational operations and assets, individuals, other organizations, or the Nation that derive from the operation and use of organizational information systems and the environments in which those systems operate.

The essential elements of information in a risk assessment can be described in three sections of the risk assessment report (or whatever vehicle is chosen by organizations to convey the results of the assessment): (i) an executive summary; (ii) the main body containing detailed risk assessment results; and (iii) supporting appendices.


NIST 800-30 Guide for Conducting Risk Assessments

as you complete this report, paying special attention to

Section 2.4 Application of Risk Assessments


*Your report should focus on either Tier 1, Tier 2 or Tier 3.

Search for “Tier 1” or “Tier 2” or “Tier 3” throughout the NIST 800-30 document for references to these Tiers.

1. Executive Summary

Include the following:

· List the date of the risk assessment.

· Summarize the purpose of the risk assessment.

· Describe the scope of the risk assessment.

· For Tier 1 and Tier 2 risk assessments, identify: organizational governance structures or processes associated with the assessment (e.g., risk executive [function], budget process, acquisition process, systems engineering process, enterprise architecture, information security architecture, organizational missions/business functions, mission/business processes, information systems supporting the mission/business processes).

· For Tier 3 risk assessments, identify: the information system name and location(s), security categorization, and information system (i.e., authorization) boundary.

· State whether this is an initial or subsequent risk assessment. If a subsequent risk assessment, describe the circumstances that prompted the update and include a reference to the previous Risk Assessment Report.

· Describe the overall level of risk (e.g., Very Low, Low, Moderate, High, or Very High).

· List the number of risks identified for each level of risk (e.g., Very Low, Low, Moderate, High, or Very High).

2. Body of the Report: Part 1

Include the following:


Describe the purpose of the risk assessment, including questions to be answered by the assessment. For example:

· How the use of a specific information technology would potentially change the risk to organizational missions/business functions if employed in information systems supporting those missions/business functions; or

· How the risk assessment results are to be used in the context of the RMF (e.g., an initial risk assessment to be used in tailoring security control baselines and/or to guide and inform other decisions and serve as a starting point for subsequent risk assessments; subsequent risk assessment to incorporate results of security control assessments and inform authorization decisions; subsequent risk assessment to support the analysis of alternative courses of action for risk responses; subsequent risk assessment based on risk monitoring to identify new threats or vulnerabilities; subsequent risk assessments to incorporate knowledge gained from incidents or attacks).

· Identify assumptions and constraints.

· Describe risk tolerance inputs to the risk assessment (including the range of consequences to be considered).

· Identify and describe the risk model and analytic approach; provide a reference or include as an appendix, identifying risk factors, value scales, and algorithms for combining values.

· Provide a rationale for any risk-related decisions during the risk assessment process.

· Describe the uncertainties within the risk assessment process and how those uncertainties influence decisions.

3. Body of the Report: Part 2

Include the following:

· If the risk assessment includes organizational missions/business functions, describe the missions/functions (e.g., mission/business processes supporting the missions/functions, interconnections and dependencies among related missions/business functions, and information technology that supports the missions/business functions).

· If the risk assessment includes organizational information systems, describe the systems (e.g., missions/business functions the system is supporting, information flows to/from the systems, and dependencies on other systems, shared services, or common infrastructures).

· Summarize risk assessment results (e.g., using tables or graphs), in a form that enables decision makers to quickly understand the risk (e.g., number of threat events for different combinations of likelihood and impact, the relative proportion of threat events at different risk levels).

· Identify the time frame for which the risk assessment is valid (i.e., time frame for which the assessment is intended to support decisions).

· List the risks due to adversarial threats (see

Table F-1 in Appendix F


· List the risks due to non-adversarial threats (see

Table F-2 in Appendix F



Information technology system risk assessment




Executive summary

This report is a risk assessment of Electronic Health Record (EHR) system. The risk assessment was carried out on 25th August 26, 2022 where potential risks within the system were analyzed. EHR is a critical part of information technology within healthcare that contains sensitive patient’s medical information including medical history, medications, treatment plans, diagnosis, test and laboratory results, immunization dates among other sensitive patient information. The system allows quick access and sharing of information across healthcare practitioners and departments for easy decision making. The purpose of the risk assessment was to identify potential risks that are associated with EHR systems including unauthorized access of patient’s data, erroneous deletion of sensitive patient data as well as system failure among other risks. This was an initial risk assessment to asses how secure are EHR systems. The level of risk was identified as high risk because of the sensitive nature of information contained in the system. Risk identified as high risk was unauthorized access of patient information. Security and privacy violations was classified as high risk because of its likelihood to happen. Data loss as a result of natural disaster or intentional deletion of patient’s medical records was classified as a moderate risk. In addition, EHR systems require users to key in patient medical information in to the database of the system. As a result, human error is a potential risk as users can key in wrong data. Human errors can be classified as high risk because of the likelihood of users keying in wrong data.

Body of the report: part 1

The purpose of the risk assessment was to identify the potential risks associated with the use of EHR systems within the healthcare institution. To understand potential risks a number of questions where asked. For instance, to identify the likelihood of human error when entering patient’s medical data, the practitioners were asked the number of instances when the system captured wrong patients’ medical data. Also, information regarding user authentication was asked to understand the likelihood of unauthorized access to patients’ information. For instance, the risk assessor users of the system whether they user passwords, one or two factor authentication to log in to their systems in order to enter or access patient medical records. To assess the risk of data loss through natural disaster or erroneous deletion, the users of EHR were asked if the healthcare center has a database backup for patient medical information collected through EHR. In addition, question regarding the security of the networks were asked.

Based on the above questions asked during risk assessment for EHR, it was noted that patient information faces significant risk of being exposed to unauthorized persons or being lost. Also, it was noted that there was high likelihood of erroneously recording patient information into the system. Assumptions included the likelihood of a user logging into the account of another user and accessing information they are not required to access. Access implies they can edit, delete or copy and share sensitive patient medical information without authorization. It was also assumed that since the institution did not have a backup, there was high likelihood that data would be lost incase of a natural disaster or erroneous deletion of patient’s medical data from the database.

To address the potential risks associated with EHR, a number of changes out to be implemented. For instance, to avoid unauthorized access of patients’ medical data, it is important for the healthcare center to implement two factor authentication to prevent unauthorized users from accessing sensitive medical information for patients (National Institute of Standards and Technology, 2012). The Project Risk Analysis Model (PRAM) is applicable in risk assessment for EHR system. the model uses Monte Carlo simulation to produce quantitative risk analysis output that provide actionable information to the management. For example, the model generates risk and uncertainty information of a project that aids the management to put in place preventative measures. Although the model is often used in project risk analysis, it can also be modified and applied to analyze EHR system.

Body of the report: part 2

The risk assessment of the system includes organizational functions. It seeks to identify ways in which the organisation can secure patients’ sensitive information. It explores potential areas in which the system can be compromised thus preventing the organisation from achieving its objectives and goals. EHR systems play a critical role with a healthcare organisation. It ensures that improved health outcomes as physicians are able to make fast and informed decisions in relation to patient treatment and medication prescription as it provides comprehensive patient medical data. Therefore, compromising the system means that patient information that informs their treatment decisions will be lost. In addition, one of the main focuses by healthcare center is to ensure patient privacy. Therefore, exposure of patient’s medical records to unauthorized parties is a significant failure on the side of the healthcare system.

EHR systems provides flow of information across physicians and departments that allows physicians to make fast and informed decisions regarding patients’ care. If the information is being shared over the external network, it possesses a great risk as unauthorized persons can hijack and hack sensitive patients’ medical information thus compromising patients’ privacy (National Institute of Standards and Technology, 2012).

To summarize the results of the risk assessment, EHR systems are exposed to a number of threats if the right measures are not put in place. Despite the positive impacts that technology brings in healthcare sector, it is also prone to potential risks that can be catastrophic. Assessment of the system within the healthcare center shows that the management has made little efforts to secure patients’ medical data. For instance, it was noted that a user can easily log in to another user’s account. This presents a potential risk since there would be accountability of data loss in case a user deletes data from the system. in addition, all users have the same access rights meaning they can access any patients’ data within the system despite the fact that they may not necessarily need the data. Furthermore, it was noted that the healthcare center does not have backup for its data. This means that in case of a disaster or accidental data deletion all patients medical records would be lost. The risk assessment is valid as long as the organisation continues to use the system. periodic audit of the system is required to ensure that potential risks are resolved.


National Institute of Standards and Technology (2012). Information security.
U.S. department of commerce.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price: