Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Case Study

 Case Study  

Module 7: A Case for Hackers

For this assignment, you will need to review the Case Study presented and 
develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

 Expand AllPanels Collapse AllPanels


Case Study

Lee Hospital is a large hospital system located in a large metropolitan area, well known for their use of cutting-edge advanced technological tools and patient care services. Several of the departments that are not patient facing allow their employees to work remotely with the exceptions of the annual two-day training event for non-leadership and for specialized training on information systems as needed. The hospital has experienced a significant cyber-attack that halted all operations for several hours when the network went down and exposed patient information. This attack revealed critical weaknesses in Lee Hospital’s cybersecurity infrastructure, including outdated antivirus software, weak password policies and identified that there is not a remote work policy.


Action Plan

As the Chief Security Officer at Lee Hospital, you have been asked to develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

Steps you will complete the following as part developing your cybersecurity plan include:

1. A risk assessment to determine and prioritize potential cybersecurity threats with 2-4 strategies to mitigate the threats.

2. Accounting for technical safeguards, such as a multi-factor authentication and schedule for routine updates/patches.

3. Outlining a new policy for working remotely that includes the use of a virtual private network to gain access to the employee work hub instead of simply logging into the hospital’s intranet.

Your deliverable method will be in the form one-to-one-and-a-half-page report that outlines each of the cybersecurity plan steps you completed with your recommendations for addressing the threats, technical safeguards and outline of what a remote work policy would include to limit exposing the network to threats. Your report will be double-spaced.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M7 A Case for Hackers

M7 A Case for Hackers

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Report (paper)
-Uses standard double-spacing without extra spaces between paragraphs
-Minimum length 1 page, maximum length 1.5 pages
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable -Uses standard double-spacing without extra spaces between paragraphs -Minimum length 1 page, maximum length 1.5 pages

5 pts

In Progress

Student submission mostly meets paper parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable -Is either short or over by 0.25 (1/4) of minimum/maximum page requirement

2 pts

Little Evidence

Student submission does not clearly meet the paper parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable -Is either short or over by 0.5 (1/2) of minimum/maximum page requirement

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Risk Assessment

Cybersecurity Plan: Risk Assessment
-Risk Analysis identifies potential cybersecurity threats
-Includes 2-4 strategies to mitigate threats
CO7

9 pts

Meets or Exceeds

Student submission clearly includes -Risk Analysis identifies potential cybersecurity threats -Includes 2-4 strategies to mitigate threats

6 pts

In Progress

Student submission mostly identifies the potential cybersecurity threats with strategies to mitigate threats – may be lacking complete strategies

3 pts

Little Evidence

Student submission is off topic or does not clearly identify cybersecurity threats and strategies to mitigate as part of the Risk Assessment

0 pts

No Evidence

Student submission does not clearly meet the expectations for an assessment of potential cybersecurity threats with mitigation strategies or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Technical Safeguards

Cybersecurity Plan: Technical Safeguards
-A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)
CO7

9 pts

Meets or Exceeds

Student submission clearly identifies the Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

6 pts

In Progress

Student submission mostly contains identification of Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

3 pts

Little Evidence

Student submission is off topic or does not clearly provide identification of needed technical safeguards or is incomplete or inaccurate

0 pts

No Evidence

Student submission does not clearly meet expectations for technical safeguards as part of Cybersecurity Plan or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: New Policy

Cybersecurity Plan: New Policy
-outlines policy for working remotely
-includes requirement of using virtual private network (VPN) for employee secure access
CO7

10 pts

Meets or Exceeds

Student submission has outlined a new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub

7 pts

In Progress

Student submission contains an outline for the new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub – this may be missing minor aspects or needs some clarity

4 pts

Little Evidence

Student submission is off topic or does not clearly give a detailed outline for a remote work policy where employees would utilize a virtual private network (VPN) to login and complete their work

0 pts

No Evidence

Student submission does not clearly meet expectations to provide policy outline for remote work or nothing is submitted

10 pts

Total Points: 35

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Fine Art Analysis – The Starry Night

The Starry Night, an oil painting created by Vincent van Gogh in June 1889, features an impressionistic view out the window of the psychiatric hospital where he voluntarily stayed for nearly a year after suffering a mental breakdown. Vincent van Gogh’s art was not commercially successful in his lifetime, but

English (ear)

2.1 Thesis Statement Part A Developing a Thesis Statement In order to write a focused and organized essay, you need a strong thesis statement to guide your writing. It is a summary of the main points you plan to write about and communicates the significance of your topic. The reason

My bravest Moment

  My bravest moment began in 2016, when I made the hardest decision of my life: leaving Cuba, my medical career, my home, and, most painfully, my two young children. I was a married Cuban woman, a practicing doctor, and the mother of a nine-year-old daughter and a five-year-old son.

DEV

Read and Follow The Instructions Below Carefully: STEP 1: Consider the following questions as you reflect on your developmental experiences. 1. Think back to your elementary and junior high years. How would you describe your social competence and friendships? 2. Body image is an important part of your self-esteem and is especially

engl 045

The Black Cat TOMORROW I DIE. Tomorrow I die1, and today I want to tell the world what happened and thus perhaps free my soul from the horrible* weight which lies upon it. But listen! Listen, and you shall hear how I have been destroyed. When I was a child

Eng (P)

Mandatory final draft of the rhetorical analysis (this was the rough draft). Can you please turn in a new paper that builds on the old one? This teacher is giving me hell with this assignment. Just do the best you can. Instructions Turn in a revised and edited version of

help

hw help ou can complete this Extra Credit Written Assignment for 4 extra credit points. Please answer each question in detail (about a paragraph or more per question) in 250+ words minimum total for the entire assignment.  Be sure to use professional language and grammar.  Include data from the website

English

English assistance   Paper 2 is an argumentative research paper and will focus on two (and only two texts that you find in the Durham Tech Library that address either an important issue in your current career or academic program and/or a social justice issue. You will find two credible and

week 3 ethical decision

 experienced some challenges in the global marketplace  Assignment Directions This assignment assesses  CO-3, CO-4 [content page] This week, you will select a company from the following list. This list reflects organizations that experienced some challenges in the global marketplace. · Adidas Amazon · Apple · ASDA · Coca-Cola · Facebook

WEEK 4 ENGL

Week 4 Assignment: Oedipus/Marc Antony Dialogue For this week’s discussion, respond to one of the following: · Like Oedipus, Caesar receives a dire prophecy that proves tragic. Explain how Shakespeare’s view of fate seems similar to and different than that of Sophocles in Oedipus the King. · At the end

english

  Before starting your formal Résumé Project, you’ll begin by completing this forum discussion. This activity will help you reflect on your current résumé or CV, explore current job opportunities in your field, and start thinking about how to tailor your application materials for a career opportunity.  Step 1 ???? Create

anxious generation

Explain one of Haidt’s sub-claims in the book (e.g., social media harms teen and pre-teen girls development, leading to higher levels of depression and anxiety). How does Haidt frame the claim rhetorically? What research does he provide to support the claim? What research contradicts his claim? Overall, does Haidt’s argument

S2 2

 Need help with a topic, will share the instructions with the right person. 

S2 3

 Need help with a topic, will share the instructions with the right person. 

S2 5

 Need help with a topic, will share the instructions with the right person. 

S2 4

 Need help with a topic, will share the instructions with the right person. 

S2 1

Need help with a topic, will share the instructions with the right person.

English feedback redo

Here is the feedback for this assignment that needs to be redone. feedback available All, you’ll find feedback under the draft assignment. Take a look and let me know if you have questions.  If you did not complete a draft, please do so asap and DO NOT wait for feedback.