Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Case Study

 Case Study  

Module 7: A Case for Hackers

For this assignment, you will need to review the Case Study presented and 
develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

 Expand AllPanels Collapse AllPanels


Case Study

Lee Hospital is a large hospital system located in a large metropolitan area, well known for their use of cutting-edge advanced technological tools and patient care services. Several of the departments that are not patient facing allow their employees to work remotely with the exceptions of the annual two-day training event for non-leadership and for specialized training on information systems as needed. The hospital has experienced a significant cyber-attack that halted all operations for several hours when the network went down and exposed patient information. This attack revealed critical weaknesses in Lee Hospital’s cybersecurity infrastructure, including outdated antivirus software, weak password policies and identified that there is not a remote work policy.


Action Plan

As the Chief Security Officer at Lee Hospital, you have been asked to develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

Steps you will complete the following as part developing your cybersecurity plan include:

1. A risk assessment to determine and prioritize potential cybersecurity threats with 2-4 strategies to mitigate the threats.

2. Accounting for technical safeguards, such as a multi-factor authentication and schedule for routine updates/patches.

3. Outlining a new policy for working remotely that includes the use of a virtual private network to gain access to the employee work hub instead of simply logging into the hospital’s intranet.

Your deliverable method will be in the form one-to-one-and-a-half-page report that outlines each of the cybersecurity plan steps you completed with your recommendations for addressing the threats, technical safeguards and outline of what a remote work policy would include to limit exposing the network to threats. Your report will be double-spaced.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M7 A Case for Hackers

M7 A Case for Hackers

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Report (paper)
-Uses standard double-spacing without extra spaces between paragraphs
-Minimum length 1 page, maximum length 1.5 pages
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable -Uses standard double-spacing without extra spaces between paragraphs -Minimum length 1 page, maximum length 1.5 pages

5 pts

In Progress

Student submission mostly meets paper parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable -Is either short or over by 0.25 (1/4) of minimum/maximum page requirement

2 pts

Little Evidence

Student submission does not clearly meet the paper parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable -Is either short or over by 0.5 (1/2) of minimum/maximum page requirement

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Risk Assessment

Cybersecurity Plan: Risk Assessment
-Risk Analysis identifies potential cybersecurity threats
-Includes 2-4 strategies to mitigate threats
CO7

9 pts

Meets or Exceeds

Student submission clearly includes -Risk Analysis identifies potential cybersecurity threats -Includes 2-4 strategies to mitigate threats

6 pts

In Progress

Student submission mostly identifies the potential cybersecurity threats with strategies to mitigate threats – may be lacking complete strategies

3 pts

Little Evidence

Student submission is off topic or does not clearly identify cybersecurity threats and strategies to mitigate as part of the Risk Assessment

0 pts

No Evidence

Student submission does not clearly meet the expectations for an assessment of potential cybersecurity threats with mitigation strategies or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Technical Safeguards

Cybersecurity Plan: Technical Safeguards
-A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)
CO7

9 pts

Meets or Exceeds

Student submission clearly identifies the Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

6 pts

In Progress

Student submission mostly contains identification of Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

3 pts

Little Evidence

Student submission is off topic or does not clearly provide identification of needed technical safeguards or is incomplete or inaccurate

0 pts

No Evidence

Student submission does not clearly meet expectations for technical safeguards as part of Cybersecurity Plan or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: New Policy

Cybersecurity Plan: New Policy
-outlines policy for working remotely
-includes requirement of using virtual private network (VPN) for employee secure access
CO7

10 pts

Meets or Exceeds

Student submission has outlined a new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub

7 pts

In Progress

Student submission contains an outline for the new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub – this may be missing minor aspects or needs some clarity

4 pts

Little Evidence

Student submission is off topic or does not clearly give a detailed outline for a remote work policy where employees would utilize a virtual private network (VPN) to login and complete their work

0 pts

No Evidence

Student submission does not clearly meet expectations to provide policy outline for remote work or nothing is submitted

10 pts

Total Points: 35

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Literature

Can I please have help with assignment? With this paper, you will analyze a short story of your choice and divulge the hidden meaning(s) found in the text. You may choose any of the essays on this link (or another scholarly work of your choosing):  Short Story ChoicesLinks to an

English homework

PLEASE here is the feedback of the teacher ,PLEASE I BEGGING YOU TO READ THE INSTRUCTION , image1.png image2.png

mus

Identify an historically significant action that was made by someone (an individual artist and/or group) in Twentieth-Century American Popular Music. Describe its genre and place it in the historical context. Objectives: The student is expected to listen and respond critically to music and to articulate an informed, personal reaction in

su db

Answer The Following Discussion Questions: Q1:  As illustrated in the image, there are five psychological domains. Which psychological domain are you most interested in? Why? Explain how the domain contributes to the study of psychology.   STEP 1: First, write a response with at least EIGHT substantial sentences, integrating concepts you

Interpreting Myths Through Metaphor Discussion

 In Chapter Two of World Mythology, Andy Gurevich presents a compelling exploration of how myth and metaphor shape our understanding of the world. He introduces the classical Greek concepts of Logos and Mythos to show the dual pathways of human thought—one grounded in logic and rational analysis, the other in

Analyzing the Key Aspects of Management.

Please see attached for instructions Report: Analyzing the Key Aspects of Management. Objective: This report aims to develop your understanding of the key aspects of management, including managerial functions, the various types of managers, the roles they play, and the skills they need to succeed. You will demonstrate your ability

Midterm Reflection

my overall grade in class is a 88.8 SA 4 Midterm Reflection.html Overview Fixed vs Growth Mindset from Accredited Online Training Purpose Reflection is an opportunity to look back and think about what has occurred in the past and make adjustments for the future. For our class, it is an

Plan and Communicate a Time-Based Task

Plan and Communicate a Time-Based Task SCENARIO: On Monday morning, you arrive at work and discover you have an email from your manager, Sara, about a customer service issue. She is worried because one of the company’s most important clients did not receive their shipment. While she acknowledges it isn’t your

English Homework

Week Four This week you will read a selection of literary works from the Victorian Age to the twentieth century. Student Learning Outcomes Addressed:    · Identify key ideas, significant historical or cultural events, and characteristic perspectives or attitudes expressed in the literature of different periods or regions. · Analyze literary works

Discussion Post help

Vital Signs: HR 76, RR 14 BP 130/98, Temp 100.0 oral, O2 sat-92% Introduction: Maggie is a 27 year old. Filipina single woman, accompanied by an aunt and uncle with whom she lives. Chief Complaint: ” I have schizophrenia and I need my medications ordered.” History of Chief Complaint: The

assigment reflective

assigment Week 4 Reflective Essa(y)    Learning is an ongoing process. We learn by studying, by creating, and by reflecting on what we have done.  This paper may use a first person voice, since it is YOUR reflection. No AI should be used in this essa(y).   In this final essa(y),

English assignment discussion

discussion For this discussion, you will consider your response to your final reflection essa(y) including the source you have found to extend your primary essa(y) themes and ideas.  Initial Post (250 words total for both paragraphs):   First, search the KU Online Library to find a source that supports the

Understanding Mythology and Creation Myths Objective

 This discussion board assignment aligns directly with the Chapter One learning objectives by encouraging students to define and incorporate key vocabulary terms, such as cosmogony, archetype, or monomyth, into their written responses, thereby reinforcing their comprehension and application of foundational terms (Objective 1 – Bloom’s: Remembering, Understanding). By asking students

Check the file

My topic is 4th topic مشاريع مادة األمن الصناعي -270/81 د. خالد العنزي تاريخ التسليم 2520/July/17 Write: 2500-3000 words double-spaced essay: 1- What are the main safety and ergonomic precautions associated with computer use? 2- What are the causes of al-Ahmadi refinery explosion in 2000? 3- What are the main

mu

Assignment Prompt: Identify an historically significant action that was made by someone (an individual artist and/or group) in Twentieth-Century American Popular Music. Describe its genre and place it in the historical context. Objectives: The student is expected to listen and respond critically to music and to articulate an informed, personal

WEEK 3 assigment

   ONE QUESTION Considering a Woman’s Individual Identity: Lepucki’s Use of Rhetorical Writing Strategies Jane Dough English Department ENC 1101: English Composition I Keiser University August 20, 2025 2 Considering a Woman’s Individual Identity: Lepucki’s Use of Rhetorical Writing Strategies In the essay “Our Mothers as We Never Saw Them”

week3

Annotating a LITERARY Text: Poem Annotating involves interacting with the text and making meaning of what you are reading rather than simply reading for theme. Every so often, stop and record OBSERVATIONS about different elements that you see in your poem such as tone,  speaker, language,  imagery, symbolism, or other