Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Case Study

 Case Study  

Module 7: A Case for Hackers

For this assignment, you will need to review the Case Study presented and 
develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

 Expand AllPanels Collapse AllPanels


Case Study

Lee Hospital is a large hospital system located in a large metropolitan area, well known for their use of cutting-edge advanced technological tools and patient care services. Several of the departments that are not patient facing allow their employees to work remotely with the exceptions of the annual two-day training event for non-leadership and for specialized training on information systems as needed. The hospital has experienced a significant cyber-attack that halted all operations for several hours when the network went down and exposed patient information. This attack revealed critical weaknesses in Lee Hospital’s cybersecurity infrastructure, including outdated antivirus software, weak password policies and identified that there is not a remote work policy.


Action Plan

As the Chief Security Officer at Lee Hospital, you have been asked to develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

Steps you will complete the following as part developing your cybersecurity plan include:

1. A risk assessment to determine and prioritize potential cybersecurity threats with 2-4 strategies to mitigate the threats.

2. Accounting for technical safeguards, such as a multi-factor authentication and schedule for routine updates/patches.

3. Outlining a new policy for working remotely that includes the use of a virtual private network to gain access to the employee work hub instead of simply logging into the hospital’s intranet.

Your deliverable method will be in the form one-to-one-and-a-half-page report that outlines each of the cybersecurity plan steps you completed with your recommendations for addressing the threats, technical safeguards and outline of what a remote work policy would include to limit exposing the network to threats. Your report will be double-spaced.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M7 A Case for Hackers

M7 A Case for Hackers

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Report (paper)
-Uses standard double-spacing without extra spaces between paragraphs
-Minimum length 1 page, maximum length 1.5 pages
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable -Uses standard double-spacing without extra spaces between paragraphs -Minimum length 1 page, maximum length 1.5 pages

5 pts

In Progress

Student submission mostly meets paper parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable -Is either short or over by 0.25 (1/4) of minimum/maximum page requirement

2 pts

Little Evidence

Student submission does not clearly meet the paper parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable -Is either short or over by 0.5 (1/2) of minimum/maximum page requirement

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Risk Assessment

Cybersecurity Plan: Risk Assessment
-Risk Analysis identifies potential cybersecurity threats
-Includes 2-4 strategies to mitigate threats
CO7

9 pts

Meets or Exceeds

Student submission clearly includes -Risk Analysis identifies potential cybersecurity threats -Includes 2-4 strategies to mitigate threats

6 pts

In Progress

Student submission mostly identifies the potential cybersecurity threats with strategies to mitigate threats – may be lacking complete strategies

3 pts

Little Evidence

Student submission is off topic or does not clearly identify cybersecurity threats and strategies to mitigate as part of the Risk Assessment

0 pts

No Evidence

Student submission does not clearly meet the expectations for an assessment of potential cybersecurity threats with mitigation strategies or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Technical Safeguards

Cybersecurity Plan: Technical Safeguards
-A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)
CO7

9 pts

Meets or Exceeds

Student submission clearly identifies the Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

6 pts

In Progress

Student submission mostly contains identification of Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

3 pts

Little Evidence

Student submission is off topic or does not clearly provide identification of needed technical safeguards or is incomplete or inaccurate

0 pts

No Evidence

Student submission does not clearly meet expectations for technical safeguards as part of Cybersecurity Plan or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: New Policy

Cybersecurity Plan: New Policy
-outlines policy for working remotely
-includes requirement of using virtual private network (VPN) for employee secure access
CO7

10 pts

Meets or Exceeds

Student submission has outlined a new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub

7 pts

In Progress

Student submission contains an outline for the new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub – this may be missing minor aspects or needs some clarity

4 pts

Little Evidence

Student submission is off topic or does not clearly give a detailed outline for a remote work policy where employees would utilize a virtual private network (VPN) to login and complete their work

0 pts

No Evidence

Student submission does not clearly meet expectations to provide policy outline for remote work or nothing is submitted

10 pts

Total Points: 35

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

for a guy

I have a powerpoint already done an I need a guy to do an audio on the slides

engl 110 & 045

Part A (Les) How to Complete This Assignment This assignment offers the opportunity to practice citing sources in MLA documentation format. Assignment Instructions Go to this website and complete the interactive MLA Activity (9th Edition): https://owl.excelsior.edu/citation-and-documentation/mla-style/mla-activity/  Once you’ve completed your activity, download a completion report using the “Printing and Download

thesis statement

Topic: “Your Children’s Smartphones Aren’t Making Them Smarter.”  CNN Wire, 2 Sept. 2024.  Gale In Context:      College, link.gale.com/apps/doc/A806893299/CSIC?u=durham_tccl&sid=summon&xid=e814ac0d. In class assignment: · Send me your revised thesis statement for paper 1 in your ENG 111 course. If you did not submit a thesis statement last Tuesday, submit one

engl 110

Read about the differences between a flyer and a brochure. · · · https://www.greenerprinter.com/blog/flyer-vs-brochure-whats-the-difference/   Complete Exercise 5.1 and Exercise 5.5 from your textbook and turn them in. These should be two separate uploaded files. · Exercise 5.1 is “Create a flier advertising a business for which you have worked in

critical thinking Belle

Critical Thinking (try to answer as best you can because I don’t have the textbook for this. I did find info that pertains to it online) Post initial post by Tuesday 11:59 PM, response by Thursday 11:59 PM There is a lot of information online about the HPV vaccine. Some

engl 110

(visual assignment) Belle Remember that you cannot submit AI-generated work. You may use AI to check your grammar or to help you evaluate your own ideas. You may also use it to ask what is missing for your infographic or visual instructions. If you have questions about how to ethically

The Executive Memo

  The Executive Memo Week 5: The Executive Memo The Executive Memo A concern has been raised that this digital transformation initiative may negatively impact your company’s customers. You have discuss this concern with your supervisor. You have been told that the executive vice president over marketing has expressed concern

Please see attached

Purpose: In this assignment, you will conduct a SWOT analysis to assess how moral imagination has been applied in real-world leadership situations, particularly in cross-cultural contexts. This will allow you to explore the strengths, weaknesses, opportunities, and threats that arise when leaders use moral imagination in decision-making.   Instructions: 1.

TSK1

READ THE ATTACHMENT!!! MSML ANNOTATED BIBLIOGRAPHY-[LAST NAME] 2 <Prompt A: Annotated Bibliography> [Note: Use the following format and instructions to create an annotated reference for each article you select.] Author, A. A., Author, B. B., & Author, C. C. (Year). Title of article. Title of Periodical, volume number(issue number), pages.

engl (les)

Engl 045 (Les) Part A 4.1 Writing an Interesting Introduction Paragraph The first paragraph of your essay should introduce your reader to the main topic. This introduction serves to outline the general subject matter of your essay before transitioning to a more specific thesis statement, which presents the main argument

Enhancing rewards

  Enhancing Reward Effectiveness and Reflecting on Self-Leadership In this discussion, consider the different strategies that can be used to improve the effectiveness of rewards in the workplace. Think about how aligning rewards with individual and team goals, offering meaningful recognition, and ensuring fairness can enhance motivation and job satisfaction.

Brand Engl

Created by the Virginia Wesleyan College Learning Center Clarke Hall, Room 223 Need help from a tutor? Visit Rhetorical Analysis Thesis Statements A strong thesis statement for a rhetorical analysis essay…  Avoids using the first person or phrases like “I believe” or “I think”  Serves as a guide

IB 4 2

 Need help with a topic and will share the instructions with the right person. 

IB 4 3

 Need help with a topic and will share the instructions with the right person. 

IB 4 4

 Need help with a topic and will share the instructions with the right person. 

IB 4 1

Need help with a topic and will share the instructions with the right person.

English Homework

Se Attached Red Snapper Forecast Assignment Week 5: You have been asked to analyze the trends in Red Snapper taken out of the coastal waters of Louisiana. The data (in Tons) for the last four years is recorded in the table below. There are 4 Tasks you will need to

The KPI Dashboard

The KPI Dashboard Week 4: The KPI Dashboard The KPI Dashboard Your manager is concerned about the poor outcomes from recent earlier attempts at such digital transformation. That is the on again, off again approaches that were unsuccessful. From your analysis. Prior attempts were unsuccessful because they lacked effect of