Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Healthcare and Public Health Sector (hospitals)

· Healthcare and Public Health Sector (hospitals)

Prior to beginning work on this assignment, please:

· Read

·

Secure Cyberspace and Critical InfrastructureLinks to an external site.

·

Preserve and Uphold the Nation’s Prosperity and Economic SecurityLinks to an external site.

· Chapter 1 of 
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation

·

Analysis of Critical Infrastructure Dependencies and InterdependenciesLinks to an external site.

When thinking about a targeted cyberattack on the area of critical infrastructure you selected, consider the third- and fourth-order effects that show how far-reaching and devastating a cyberattack could be and how it might ultimately impact another Critical Infrastructure and Key Resource (CIKR) facility.

For example, a first-order effect would be the initial attack, and second-order effects would be the direct results of the attack. A first-order effect might be an attack against a power station, and a second-order effect might be that no traffic lights are operational. However, beyond the second (intended impact) order may be additional consequences, such as a significant traffic accident. A fourth-order effect might be multiple deaths, because ambulances can’t get to the accident and back to the hospital.

Building a Hazard Tree

A hazard tree requires that an analysis of hazards be done systematically. The tree can be represented as either an outline or a diagram. Its presentation should be in an attractive format to help visualize different levels of danger that may not have been previously considered. Two examples of how you might present your tree are provided.

The first example shows an outline, which can be created using a simple note outline in a Word document. There is one first-order hazard and two second-order hazards in the example. The first sequence is five orders deep and the second sequence is four orders deep.

1st Order: Attack at power station

·
2nd Order: Traffic lights inoperable

·
3rd Order: Multiple vehicle accidents

·
4th Order: Deaths because emergency vehicles hindered by traffic light issues

·
5th Order: Emergency services overtaxed due to increased deaths and injuries from accidents

·
2nd Order: Nearby hospitals on backup power supplies

·
3rd Order: Hospitals have reduced functionality for non-essential tasks

·
4th Order: Non-emergency care greatly limited

For the Critical Infrastructure and a Cyberattack Hazard Tree assignment, you will create a report that includes a hazard tree at least five orders deep with an analysis of how each element is interconnected.

The Critical Infrastructure and a Cyberattack Hazard Tree assignment should

· Describe which area of Critical Infrastructure or Key Resource (CIKR) your report will cover.

· Distinguish the interconnectedness of various critical infrastructure.

· Build a hazard tree diagraming the cascading effects of a cyberattack on your chosen CIKR site and other CIKR sites. It should be at least five orders deep, with a nexus to another type of CIKR site or facility.

· The point is to illustrate how an attack on one site can have cascading affects that eventually damage another site or CIKR sector.

· Summarize the measures DHS has taken to ensure resiliency of the selected infrastructure and measures that need to be implemented in the future.

The Critical Infrastructure and a Cyberattack Hazard Tree assignment

· must be four to five double-spaced pages in length (not including title and references pages) and formatted according to APA Style as outlined in the


must use at least four scholarly or official government sources

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

MS 2

Milestone Two Template BIO 212: Microbiology Name: Title of your presentation: What type of software or application will you be using for your final presentation (PowerPoint, PowerPoint with voice-over, etc.)? Outline Complete the sections with short sentences or sentence fragments. You should provide enough information to show that you have

HIMS 645 D3

  Imagine you have been hired as a data quality manager by a local healthcare facility (define your choice of a facility) that has not yet had any healthcare data quality policy. You were tasked to develop it.  Discuss the role of healthcare data quality policy in your chosen organization

FAN

FIN 5130 Mini-case 1 Real-world Application: Risk and Return Dr. Darshana Palkar Page 1 of 3 This assignment will require you to analyze time series of monthly returns of different securities. [5 points] 1) Pick FOUR companies as follows from Yahoo! Finance website: i. For each company of your choice,

Species

See attached Species: Harpia harpyja; Kemp’s ridley turtle BIO 330 Milestone One Guidelines and Rubric For this milestone, submit a literature review and indicate the species you have selected for your final project. The literature review must address the critical elements listed below and must include at least four primary and

HIMS 645 ASS 2

COVID-19 pandemic gravely affected the entire world. Being a pandemic, the outbreak required monitoring the infection rate both at the national and international levels. Which agencies collected COVID-19 related information nationally and internationally and by what method(s)? Were the methods used the same or different? Why? Assess the role of

HIMS 645 D1

 Two types of data contained in healthcare databases are Primary and Secondary depending on their sources. Pick a Healthcare organization (offer its description in 2-3 sentences). Identify the sources of primary and secondary data collected and used in that organization. Which of these sources and types of data is more reliable

HIMS 655 D2

  As a health Information management (HIM) manager, you have been assigned to review a Physicians’ documentation for completeness of a patient’s health record in EHR. Which elements of the documentation would you look for in the health record and what is the rationale for your selection of these elements?

Help

AHS1650-2 Procedural Coding Competency Checklist Name: ____________________________Date: ____________________________Score: ________________ AHS1650-2 Perform Procedural C Performance Objective: The student will be able to properly codes procedures using the current CPT manual including CPT sections anesthesia, surgery, pathology and laboratory, medicine, and radiology. Task: Locate CPT codes in sections anesthesia, surgery, pathology and

HIMS 655 ASS1

  Electronic Health Record (EHR) is a computer application for recording and retrieving patient information by authorized individuals.  However, authorized individuals can perform only the allowed activities with EHR – view, add, modify, update, and delete information based on their level of access configured through permissions.  If you are working

Biology Assignment 3

Click on the method names below to download a sample Excel spreadsheet displaying each. Averaging Download Averaging Averaging with Seasonality Download Averaging with Seasonality Exponential Smoothing Download Exponential Smoothing Exponential Smoothing with Seasonality Download Exponential Smoothing with Seasonality Exponential Smoothing with Trend Download Exponential Smoothing with Trend Exponential Smoothing with

Biology Homework

NGM2 — NGM2 TASK 1: PRACTICE IMPROVEMENT PLAN PROPOSAL ORGANIZATIONAL SYSTEMS AND HEALTHCARE TRANSFORMATION — D221 PRFA — NGM2 COMPETENCIES 738.4.1 : Compare Healthcare Delivery Models The learner compares healthcare delivery models to facilitate value-based care, shared decision-making, and equitable patient-centered care. 738.4.2 : Describe Continuous Improvement Strategies The learner

Case

Individual Case Study – Instructions (Descriptive Analysis) For the Descriptive Analysis Project, follow the instructions in the  Correlation Case Study Instructions  Download Correlation Case Study Instructions  using this data file  Pattern Recognition Data (student)  Download Pattern Recognition Data (student) .  You may use your own data for this project as

Week 8 forum post

  When we take good look at the families around us today it’s clear they are diverse. There’s an increase in single-parent, gay and lesbian, grandparent, blended family, and nontraditional households. It’s clear that the family plays a huge role in a child’s development. That being said, think about your

AP

See attachment. Case Study – Capital Investment Decisions  Bethesda Mining is a midsized coal mining company with 20 mines located in Ohio, Pennsylvania, West Virginia, and Kentucky. The company operates deep mines as well as strip mines. Most of the coal mined is sold under contract, with excess production sold

Forensic Biology Case Study Analysis

Provide a comprehensive analysis of the “Tales from the grave” article. Give a brief outline of the case and describe the biological elements that helped solve the case. Analyze how DNA science was used in cooperation with traditional investigative principles to solve the case. Using this Article: Gunasekera, R.S., A.B.