Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Case Study

 Case Study  

Module 7: A Case for Hackers

For this assignment, you will need to review the Case Study presented and 
develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

 Expand AllPanels Collapse AllPanels


Case Study

Lee Hospital is a large hospital system located in a large metropolitan area, well known for their use of cutting-edge advanced technological tools and patient care services. Several of the departments that are not patient facing allow their employees to work remotely with the exceptions of the annual two-day training event for non-leadership and for specialized training on information systems as needed. The hospital has experienced a significant cyber-attack that halted all operations for several hours when the network went down and exposed patient information. This attack revealed critical weaknesses in Lee Hospital’s cybersecurity infrastructure, including outdated antivirus software, weak password policies and identified that there is not a remote work policy.


Action Plan

As the Chief Security Officer at Lee Hospital, you have been asked to develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

Steps you will complete the following as part developing your cybersecurity plan include:

1. A risk assessment to determine and prioritize potential cybersecurity threats with 2-4 strategies to mitigate the threats.

2. Accounting for technical safeguards, such as a multi-factor authentication and schedule for routine updates/patches.

3. Outlining a new policy for working remotely that includes the use of a virtual private network to gain access to the employee work hub instead of simply logging into the hospital’s intranet.

Your deliverable method will be in the form one-to-one-and-a-half-page report that outlines each of the cybersecurity plan steps you completed with your recommendations for addressing the threats, technical safeguards and outline of what a remote work policy would include to limit exposing the network to threats. Your report will be double-spaced.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M7 A Case for Hackers

M7 A Case for Hackers

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Report (paper)
-Uses standard double-spacing without extra spaces between paragraphs
-Minimum length 1 page, maximum length 1.5 pages
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable -Uses standard double-spacing without extra spaces between paragraphs -Minimum length 1 page, maximum length 1.5 pages

5 pts

In Progress

Student submission mostly meets paper parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable -Is either short or over by 0.25 (1/4) of minimum/maximum page requirement

2 pts

Little Evidence

Student submission does not clearly meet the paper parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable -Is either short or over by 0.5 (1/2) of minimum/maximum page requirement

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Risk Assessment

Cybersecurity Plan: Risk Assessment
-Risk Analysis identifies potential cybersecurity threats
-Includes 2-4 strategies to mitigate threats
CO7

9 pts

Meets or Exceeds

Student submission clearly includes -Risk Analysis identifies potential cybersecurity threats -Includes 2-4 strategies to mitigate threats

6 pts

In Progress

Student submission mostly identifies the potential cybersecurity threats with strategies to mitigate threats – may be lacking complete strategies

3 pts

Little Evidence

Student submission is off topic or does not clearly identify cybersecurity threats and strategies to mitigate as part of the Risk Assessment

0 pts

No Evidence

Student submission does not clearly meet the expectations for an assessment of potential cybersecurity threats with mitigation strategies or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Technical Safeguards

Cybersecurity Plan: Technical Safeguards
-A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)
CO7

9 pts

Meets or Exceeds

Student submission clearly identifies the Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

6 pts

In Progress

Student submission mostly contains identification of Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

3 pts

Little Evidence

Student submission is off topic or does not clearly provide identification of needed technical safeguards or is incomplete or inaccurate

0 pts

No Evidence

Student submission does not clearly meet expectations for technical safeguards as part of Cybersecurity Plan or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: New Policy

Cybersecurity Plan: New Policy
-outlines policy for working remotely
-includes requirement of using virtual private network (VPN) for employee secure access
CO7

10 pts

Meets or Exceeds

Student submission has outlined a new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub

7 pts

In Progress

Student submission contains an outline for the new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub – this may be missing minor aspects or needs some clarity

4 pts

Little Evidence

Student submission is off topic or does not clearly give a detailed outline for a remote work policy where employees would utilize a virtual private network (VPN) to login and complete their work

0 pts

No Evidence

Student submission does not clearly meet expectations to provide policy outline for remote work or nothing is submitted

10 pts

Total Points: 35

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Art/Illustration

 Notes & Major Points  This file is too large to display.View in new window

tas2

READ THE ATTACHMENTS!!! VWM1: Decision-Making Framework Measurement Model Template Measurement Model Template Primary Business Objective: Increase Profits Secondary Business Objective: Increase Awareness SMART Goal SMART Goal SMART Goal KPI KPI KPI KPI KPI KPI PAGE 1

Public health

Policy Analysis Section 4- Final Draft (100 points) PH 528 Introduction: State Senator Hob Bryan (Mississippi District 7) is the chairman of the Mississippi State Senate Public Health and Welfare Committee. Now that the state legislature has passed a bill legalizing medical marijuana use in the state, members of the

Public health

Assignment #5 PH 528 Directions: Read the “Incarceration Case Study”, which outlines policy efforts to address public health in prisons and among incarcerated populations. Respond to the following questions, with each response a minimum of 150 words. Due Date: Upload your assignment to Blackboard as a .doc or .docx file

Need asap

Need  Liife Rewound Project: Character Timeline Create a detailed timeline or storyboard showcasing the key moments in the character’s life journey, working backward from their death to their birth. Each stage of the character’s life will be visually represented, accompanied by annotations or descriptions highlighting important events and developmental milestones.

Please see attached

Please critique Use the template below to answer the above question. · 600 words in length (typed, double-spaced, 12-point font) excluding the title and reference pages. · The student will automatically lose points if these guidelines are not followed. · Reference article and other references recommended 1. Briefly and clearly

Please see attached

Describe and evaluate the evolution, present and future effect of ChatGPT and Artificial Intelligence on social media.   Submission Instructions: · The paper to be a minimum of 1,000 words in length (typed, double-spaced, 12-point font) excluding the title and reference pages. The student will automatically lose points if these

Please see attached

Please critique Use the template below to answer the above question. · 600 words in length (typed, double-spaced, 12-point font) excluding the title and reference pages. · The student will automatically lose points if these guidelines are not followed. · Reference article and other references recommended 1. Briefly and clearly

TEMPLATE

According to the case to finish the template This file is too large to display.View in new window

AR

Part 1  Question at position 1  Find a work of art to answer the following questions.  The artwork can be from any culture or time period. Give a short description of the work: · Is it realistic, abstract or non-objective? · What does it depict? What colors are used? ·

TAS1

READ THE ATTACHMENT!!! PAGES 14 Introduction This task will assess your knowledge about digital marketing analytics concepts such as data types, data structures, the digital marketing analytics (DMA) framework, the McKinsey consumer decision journey model, and marketing technology MarTech stacks. You will use the information provided in the attached scenario

I need help d7

Class Discussion – Week 7 Connect the example you found for your Dropbox assignment to a reading or concept previously covered in the course. Discuss how the nonviolent actions depicted in your chosen campaign contribute to the constructive transformation of conflicts within the frameworks or theoretical perspectives we’ve explored so

I need help c7

Conflict Exercises – Week 7 For your Dropbox exercise this week, search for a credible online news source and find an example of a current nonviolent action or campaign. Include a link to the source and provide a brief description of the campaign’s objectives. Also, refer to Gene Sharp’s comprehensive

Great 2

Choose only one topic. · Thinking about “The Secret Lion,” consider this: Is Sergio necessary to the story, or would the events described be the same without him? Explain. Think about things you’ve done, adventures you’ve had. Did you do it alone, or did you have a buddy with you?

snh

Influence of Trauma in Early Childhood on the Mental Health and Development of Adolescents In this discussion, you will describe ethical issues involved with your research proposal and provide feedback to classmates on their plans for handling ethical issues. Include the following in your initial discussion post: · Explain the

gc

I cannot attend class find one that was this week in zip code  Louisiana is my state zip code 71052 This assignment will familiarize you with 12-step and support groups. This is a valuable in-person experience with community resources and support. Locate an  “open”  recovery or support group in your

Need SOP and Resume help

i am looking for SOP and Resume preparation help in order to pursue distance learning for   Masters in Artificial Intelligence .