Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Case Study

 Case Study  

Module 7: A Case for Hackers

For this assignment, you will need to review the Case Study presented and 
develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

 Expand AllPanels Collapse AllPanels


Case Study

Lee Hospital is a large hospital system located in a large metropolitan area, well known for their use of cutting-edge advanced technological tools and patient care services. Several of the departments that are not patient facing allow their employees to work remotely with the exceptions of the annual two-day training event for non-leadership and for specialized training on information systems as needed. The hospital has experienced a significant cyber-attack that halted all operations for several hours when the network went down and exposed patient information. This attack revealed critical weaknesses in Lee Hospital’s cybersecurity infrastructure, including outdated antivirus software, weak password policies and identified that there is not a remote work policy.


Action Plan

As the Chief Security Officer at Lee Hospital, you have been asked to develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

Steps you will complete the following as part developing your cybersecurity plan include:

1. A risk assessment to determine and prioritize potential cybersecurity threats with 2-4 strategies to mitigate the threats.

2. Accounting for technical safeguards, such as a multi-factor authentication and schedule for routine updates/patches.

3. Outlining a new policy for working remotely that includes the use of a virtual private network to gain access to the employee work hub instead of simply logging into the hospital’s intranet.

Your deliverable method will be in the form one-to-one-and-a-half-page report that outlines each of the cybersecurity plan steps you completed with your recommendations for addressing the threats, technical safeguards and outline of what a remote work policy would include to limit exposing the network to threats. Your report will be double-spaced.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M7 A Case for Hackers

M7 A Case for Hackers

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Report (paper)
-Uses standard double-spacing without extra spaces between paragraphs
-Minimum length 1 page, maximum length 1.5 pages
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable -Uses standard double-spacing without extra spaces between paragraphs -Minimum length 1 page, maximum length 1.5 pages

5 pts

In Progress

Student submission mostly meets paper parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable -Is either short or over by 0.25 (1/4) of minimum/maximum page requirement

2 pts

Little Evidence

Student submission does not clearly meet the paper parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable -Is either short or over by 0.5 (1/2) of minimum/maximum page requirement

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Risk Assessment

Cybersecurity Plan: Risk Assessment
-Risk Analysis identifies potential cybersecurity threats
-Includes 2-4 strategies to mitigate threats
CO7

9 pts

Meets or Exceeds

Student submission clearly includes -Risk Analysis identifies potential cybersecurity threats -Includes 2-4 strategies to mitigate threats

6 pts

In Progress

Student submission mostly identifies the potential cybersecurity threats with strategies to mitigate threats – may be lacking complete strategies

3 pts

Little Evidence

Student submission is off topic or does not clearly identify cybersecurity threats and strategies to mitigate as part of the Risk Assessment

0 pts

No Evidence

Student submission does not clearly meet the expectations for an assessment of potential cybersecurity threats with mitigation strategies or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Technical Safeguards

Cybersecurity Plan: Technical Safeguards
-A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)
CO7

9 pts

Meets or Exceeds

Student submission clearly identifies the Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

6 pts

In Progress

Student submission mostly contains identification of Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

3 pts

Little Evidence

Student submission is off topic or does not clearly provide identification of needed technical safeguards or is incomplete or inaccurate

0 pts

No Evidence

Student submission does not clearly meet expectations for technical safeguards as part of Cybersecurity Plan or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: New Policy

Cybersecurity Plan: New Policy
-outlines policy for working remotely
-includes requirement of using virtual private network (VPN) for employee secure access
CO7

10 pts

Meets or Exceeds

Student submission has outlined a new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub

7 pts

In Progress

Student submission contains an outline for the new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub – this may be missing minor aspects or needs some clarity

4 pts

Little Evidence

Student submission is off topic or does not clearly give a detailed outline for a remote work policy where employees would utilize a virtual private network (VPN) to login and complete their work

0 pts

No Evidence

Student submission does not clearly meet expectations to provide policy outline for remote work or nothing is submitted

10 pts

Total Points: 35

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Check the file

My topic is 4th topic مشاريع مادة األمن الصناعي -270/81 د. خالد العنزي تاريخ التسليم 2520/July/17 Write: 2500-3000 words double-spaced essay: 1- What are the main safety and ergonomic precautions associated with computer use? 2- What are the causes of al-Ahmadi refinery explosion in 2000? 3- What are the main

mu

Assignment Prompt: Identify an historically significant action that was made by someone (an individual artist and/or group) in Twentieth-Century American Popular Music. Describe its genre and place it in the historical context. Objectives: The student is expected to listen and respond critically to music and to articulate an informed, personal

WEEK 3 assigment

   ONE QUESTION Considering a Woman’s Individual Identity: Lepucki’s Use of Rhetorical Writing Strategies Jane Dough English Department ENC 1101: English Composition I Keiser University August 20, 2025 2 Considering a Woman’s Individual Identity: Lepucki’s Use of Rhetorical Writing Strategies In the essay “Our Mothers as We Never Saw Them”

week3

Annotating a LITERARY Text: Poem Annotating involves interacting with the text and making meaning of what you are reading rather than simply reading for theme. Every so often, stop and record OBSERVATIONS about different elements that you see in your poem such as tone,  speaker, language,  imagery, symbolism, or other

English homework

Discussion Board 5: The Victorian Age and Modernist Age   For this discussion board, you will choose any one of the following prompts. Once you have made your selection, please draft your initial post based on the instructions below. a.  The poem, The Last Duchess” is called a dramatic monologue

English english homework

DISCUSION 4 :REPLY Post 1) The book  Gulliver’s Travels by Jonathan Swift contains several stories, but the one involving the Yahoos is the most interesting and reflective. The Yahoos were human-like brutes, or at least that is how Gulliver viewed them. Throughout the story, the Yahoos are portrayed as selfish and

mus

Mamie Smith, Gertrude “ma Rainey”  and Bessie Smith, very emotional singers, with strong and personal styles. PROMPT: 1/What role did women play in blues song/music during 1920s and 1930s? 2/What are some examples of the relationship between music and identity in American popular music? I am looking forward to reading your statements

WWE6

Imagine the group you have been designing has had the opportunity to meet for at least two sessions. Over the two group sessions, some topics have surfaced that are challenging for group members. Choose three of the topics from the following list that have surfaced in your group. o  

Week 6

Week 6 Introduction “Since you cannot do this very little thing, why do you worry about the rest? Consider how the wild flowers grow. They do not labor or spin. Yet I tell you, not even Solomon in all his splendor was dressed like one of these. If that is

Week 5

Week 6 Introduction “Since you cannot do this very little thing, why do you worry about the rest? Consider how the wild flowers grow. They do not labor or spin. Yet I tell you, not even Solomon in all his splendor was dressed like one of these. If that is

English HOMEWORK

Week Two: June 16-22 This week you will read a selection of literary works from the Tudor Age to the Age of Revolution. Students will study works of prose, poetry, drama, and fiction in relation to their historical and cultural contexts. Texts will be selected from among a diverse group

English Homework

Interview a Fictional Character Completing this assignment will fulfil the requirements for the Dallas College Critical Thinking Core Competency Assignment. The Critical Thinking Core Objective allows students to develop a wide variety of skills: · Analyze issues · Complex/creative problem solving: anticipate problems, solutions and consequences · Knowledge application: apply

English homework

As with all discussion boards, your initial response should be at least 300 words. Then reply to two (2) other posts. Your response should be of at least 100 words each.  Feel free to exceed these minimum requirements. Try to pick students who do not have any comments yet. When commenting, please add

English homework

1) To that end, please begin your post with the following statements: ”I have not used AI to write any part of this post for me. I would not do that, because I am not a dishonest person.” I will deduct 10 points if these statements are missing from your

Week4

Week 4 Overview We will be studying “the most significant psychologist of the twentieth century:” The person-centered therapy of Carl Rogers. The foundational principles he developed expound on the creation of a strong healing relationship with a client. These principles have become germane to most of the therapies we will

English Homework

26 April 2024 Form 1009W, Special Assessing Writing Analytical Essay Version 2.1 1 SHARP THE NCO LEADERSHIP CENTER of EXCELLENCE Senior Leader Course NCO Common Core Competencies Form 1009W, Special, Assessing Writing STUDENT’S NAME: ASSIGNMENT TITLE: Analytical essay DATE: FACILITATOR’S NAME: RATING: Unsatisfactory 0% Did Not Meet Standard 69% Met

HelP

Lets Talk Research Essay Assignment Overview The major project in this class is your persuasive research essay. Your research essay must be a 10-12 page (approximately 2500-3000 word) essay that takes a clearly definable stance regarding an issue, supports it with credible research, and defends it effectively in an appropriate

gcu wee

1.1 Discuss how your understanding of group dynamics, communication patterns, and developmental stages can inform your decision-making process when selecting and adapting group exercises. Based on your Christian worldview, how might this knowledge enhance your ability to meet the unique needs of your group? Include at least one scholarly source