Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

outline a contingency plan

 outline a contingency plan 

Module 6: A Case for Back-up & Recovery

For this assignment, you will need to review the Case Study presented and outline a contingency plan that addresses possible security threats and breaches, provides a strategy to minimize the disruption to hospital operations while protecting patient information.

 Expand AllPanels Collapse AllPanels


Case Study

DeVry Hospital, a 200-bed acute-care facility, has been encountering security incidents involving a ransomware attack, in addition to a major breach of patient records. The Chief Privacy & Security Officer is requesting a contingency plan that will minimize the potential for security threats and provide for continuity of the necessary hospital operations to care for patients.


Action Plan

As a member of the security team, you have been asked to outline a contingency plan to counteract the identified ransomware attacks, data breaches and prepare the hospital for natural disasters and potential system failures. You plan should include clear procedures for mitigating the security breaches.

Steps you will complete the following as part of your proposed contingency plan:

1. Provide a risk assessment that identifies and prioritizes potential security threats.

2. Propose possible strategies to prevent security incidents. This should involve system updates, possible employee training that may be needed and security protocols.

3. Outline a procedure for regular data backups with a clear data recovery plan in case of a system crash.

4. Recommend a process for completing a post-incident review to ensure a thorough investigation is completed to identify any potential gaps in the existing contingency plan.

Your deliverable method can be either in the form of a half-page to full page proposal or PowerPoint slides that outline each of the strategies you are proposing with an action plan for implementing them. For PowerPoint slides, the slides should outline your key points/recommendations and utilize the Notes section under your slides to provide complete sentences for your report as if you were presenting to a board for approval to implement.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M6 A Case for Back-up & Recovery

M6 A Case for Back-up & Recovery

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Paper Option
-Uses standard double-spacing without extra spaces between bullets or paragraphs
-Minimum length 1/2 page, maximum length 1 page
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

PowerPoint Option
-No more than 5 bullets per slide
-Keep slides uncluttered so easy to follow
-Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes)
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list on a reference slide IF applicable

5 pts

Meets or Exceeds

Student submission clearly encompasses all of PowerPoint presentation parameters -Minimum of 5 content slides, Maximum of 8 content slides -Includes a title slide -Includes a reference slide if needed -Presentation developed from perspective as if being presented to the board -No more than 5 bullets per slide -Keep slides uncluttered so easy to follow -Includes use of graphical representations to give visual emphasis & credibility to presentation -Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes) -Free of grammatical & spelling errors -Uses APA in-text citations and reference list on a reference slide IF applicable

3 pts

In Progress

Student submission clearly encompasses all paper or PowerPoint parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable

1 pts

Little Evidence

Student submission does not clearly meet the paper or PowerPoint parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

5 pts

This criterion is linked to a Learning OutcomeRisk Assessment

Risk Assessment
-Provides risk assessment that identifies potential security threats
-Includes prioritization of potential security threats

7 pts

Meets or Exceeds

Student submission provides clear identification of potential security threats through risk assessment and includes prioritization of potential security threats

5 pts

In Progress

Student submission mostly provides identification of potential security threats through risk assessment and inclusion of prioritization of potential security threats – may be missing pertinent information

2 pts

Little Evidence

Student submission is off topic for control mechanisms or does not identify potential security threats through risk assessment and inclusion of prioritization of potential security threats

0 pts

No Evidence

Student submission does not clearly meet the expectations for identifying potential security threats through risk assessment and inclusion of prioritization of potential security threats

7 pts

This criterion is linked to a Learning OutcomeSecurity Incident Prevention

Security Incident Prevention
Provides strategies to prevent potential security incidents that includes consideration of
-system updates
-possible employee training
-needed security protocols
CO6

7 pts

Meets or Exceeds

Student submission on Security Incident Prevention clearly identifies strategies to prevent potential security incidents that includes consideration of -system updates -possible employee training -needed security protocols

5 pts

In Progress

Student submission on Security Incidence Prevention mostly identifies strategies to prevent potential security incidents that includes consideration of -system updates -possible employee training -needed security protocols

2 pts

Little Evidence

Student submission on Security Incidence Prevention does not consider all of these factors -system updates -possible employee training -needed security protocols

0 pts

No Evidence

Student submission on Security Incidence Prevention clearly does not meet expectations or nothing submitted

7 pts

This criterion is linked to a Learning OutcomeTraining Programs

Training Programs
-Findings of review on training program deficiencies encompasses assessment on proper use/protocols on electronic health record and HIPAA compliance
CO6

7 pts

Meets or Exceeds

Student submission on Training Programs clearly addresses findings of review on training program deficiencies and encompasses assessment on proper use/protocols on electronic health record and HIPAA compliance

5 pts

In Progress

Student submission on Training Programs mostly addresses findings of review on training program deficiencies and encompasses assessment on proper use/protocols on electronic health record and HIPAA compliance but may be lacking details

2 pts

Little Evidence

Student submission on Training Programs is off topic or does not clearly address findings of a review covering training program deficiencies relating to use/protocols on electronic health record and/or HIPAA compliance

0 pts

No Evidence

Student submission clearly does not meet expectations on addressing training program review findings or nothing submitted

7 pts

This criterion is linked to a Learning OutcomePost Incident Review Process

Post Incident Review Process
Proposes a process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan
CO6

9 pts

Meets or Exceeds

Student submission of Post Incident Review clearly proposes a process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan

6 pts

In Progress

Student submission of Post Incident Review mostly identifies a process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan

3 pts

Little Evidence

Student submission of Post Incident Review is off topic or does not clearly give a proposed process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan

0 pts

No Evidence

Student submission does not clearly meet expectations to provide proposed process to follow post-incident review

9 pts

Total Points: 35

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

english

We’re sorry but this app doesn’t work properly without JavaScript enabled. Please enable it to continue. MGMT 365 Chapter 5 Fall 2025 Share Thread details Share Embed Report inappropriate content Language: English (US) No results Show related comments Comments by slide Playback speed 1x (normal) Slower Faster 1x Before selecting

Introduction Paragraph

Follow this outline I. Introduction A. Hook: Have you ever bought a shirt that looked great, was super cheap and trendy at first, but then ripped or faded after just one wash? That’s fast fashion. B. Background info: Fast fashion is all about trendy clothes made really fast and sold

Developing Categories for the Literature Review

2 In this discussion topic, we will explore some resources that are designed to help students understand the concept of a  literature review. Please browse these resources and then complete the discussion post below. · the article by Debora F.B. Leite, Maria Auxiliadora Soares Padilha, Jose G. Cecatti, “Approaching Literature Review for

Introduction Paragraph

Outline of Essay    I. Introduction A. Hook: College sports bring in billions through ticket sales, merchandise, and TV deals, yet the athletes themselves rarely see direct financial benefits. B. Background Info: The NCAA currently prevents college athletes from being directly paid, though schools and networks profit heavily. Many athletes

Visual Aid

Attached Why use visual aids? Make ideas clear and understandable 1 Make a speech more interesting 2 Can help an audience remember facts and details 3 Why use visual aids Make long complicated explanations unnecessary 1 Help prove a point 2 Can add to your credibility (if used correctly) 3

FieldWork

(on file) KINESICS: the study of body motion or body behavior. In this assignment, уou will venture out into a рubliс sрaсe (i.e. a сoffee shoр, рark, mall) and observe the рeoрle around уou. Tune out what theу are saуing and then sit baсk and watсh. Take notes on what

Question

Need help with a question Stewart-Steele1 MWP #1: Profile of a Culture or Ethnic Group Weight: 20% of final grade Length and Formatting: 2-3 pages, typed, double-spaced, Black 12-point Times New Roman font, using standard MLA format. Assignment Preparation: Brainstorm about a culture or ethnic group. (Useful for Mind Map

The Six-Source ES

Writing Assignment # 2 The Six-Source Essay: Expanded Synthesis Summary of assignment · Six Source Essay-WA#2-Click on this link! Turnitin™ This assignment will be submitted to Turnitin™. Instructions Instructions You will receive a preliminary grade on your initial draft. The revision is due after receiving instructor feedback and revising the

Preparing for the Six-Source and the Synthesis of Sources

1 Week 4, Discussion 1 — Preparing for the Six-Source Essay and the Synthesis of Sources Essay (Literature Review)   Must post first. Your response to this discussion is  due by this week Friday at 11:59 PM Eastern Standard Time (EST). You are also asked to respond to at least one

W3 1

 Need help with a topic and will share with the right person. 

W3 3

 Need help with a topic and will share with the right person. 

W3 4

 Need help with a topic and will share with the right person. 

W3 2

 Need help with a topic and will share with the right person. 

Notes & Major Points

fastcompany.com What deserves to be in a design museum? Grace Snelling 5–7 minutes At the entrance of the Cooper Hewitt design museum’s latest exhibition, Acquired! Shaping the National Design Collection, two objects sit side-by-side. One is a 3D-printed model of a coronavirus particle, 2020; the other is a turquoise lotus-

Need asap.

Part A – Download the Genogram Template to create a genogram of your family of origin with the career information about your parent(s), sibling(s), aunt(s), uncle(s), and grandparent(s). Initial Post: Along with the Genogram, in your initial post, highlight any patterns of influences you notice about familial career choice along

geog

Lab 1 Using ArcGIS Online Open up a web browser go to: In the upper right corner, click Sign In, be sure to sign in to your account linked with PCC that you set up. Remember your username and password, you will use these throughout the semester. Choose Map from

MS

READ THE ATTACHED FILE!!! Introduction For this task, you will assess your personal leadership effectiveness using emotional intelligence, leadership skills, and character strengths. You will complete three self-assessments for this task: 360° Refined™ Leadership Test, CQ Pro Assessment, and VIA Character Strengths Survey. Additionally, you will write a paper assessing