Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Case Study

 Case Study  

Module 7: A Case for Hackers

For this assignment, you will need to review the Case Study presented and 
develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

 Expand AllPanels Collapse AllPanels


Case Study

Lee Hospital is a large hospital system located in a large metropolitan area, well known for their use of cutting-edge advanced technological tools and patient care services. Several of the departments that are not patient facing allow their employees to work remotely with the exceptions of the annual two-day training event for non-leadership and for specialized training on information systems as needed. The hospital has experienced a significant cyber-attack that halted all operations for several hours when the network went down and exposed patient information. This attack revealed critical weaknesses in Lee Hospital’s cybersecurity infrastructure, including outdated antivirus software, weak password policies and identified that there is not a remote work policy.


Action Plan

As the Chief Security Officer at Lee Hospital, you have been asked to develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

Steps you will complete the following as part developing your cybersecurity plan include:

1. A risk assessment to determine and prioritize potential cybersecurity threats with 2-4 strategies to mitigate the threats.

2. Accounting for technical safeguards, such as a multi-factor authentication and schedule for routine updates/patches.

3. Outlining a new policy for working remotely that includes the use of a virtual private network to gain access to the employee work hub instead of simply logging into the hospital’s intranet.

Your deliverable method will be in the form one-to-one-and-a-half-page report that outlines each of the cybersecurity plan steps you completed with your recommendations for addressing the threats, technical safeguards and outline of what a remote work policy would include to limit exposing the network to threats. Your report will be double-spaced.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M7 A Case for Hackers

M7 A Case for Hackers

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Report (paper)
-Uses standard double-spacing without extra spaces between paragraphs
-Minimum length 1 page, maximum length 1.5 pages
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable -Uses standard double-spacing without extra spaces between paragraphs -Minimum length 1 page, maximum length 1.5 pages

5 pts

In Progress

Student submission mostly meets paper parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable -Is either short or over by 0.25 (1/4) of minimum/maximum page requirement

2 pts

Little Evidence

Student submission does not clearly meet the paper parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable -Is either short or over by 0.5 (1/2) of minimum/maximum page requirement

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Risk Assessment

Cybersecurity Plan: Risk Assessment
-Risk Analysis identifies potential cybersecurity threats
-Includes 2-4 strategies to mitigate threats
CO7

9 pts

Meets or Exceeds

Student submission clearly includes -Risk Analysis identifies potential cybersecurity threats -Includes 2-4 strategies to mitigate threats

6 pts

In Progress

Student submission mostly identifies the potential cybersecurity threats with strategies to mitigate threats – may be lacking complete strategies

3 pts

Little Evidence

Student submission is off topic or does not clearly identify cybersecurity threats and strategies to mitigate as part of the Risk Assessment

0 pts

No Evidence

Student submission does not clearly meet the expectations for an assessment of potential cybersecurity threats with mitigation strategies or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Technical Safeguards

Cybersecurity Plan: Technical Safeguards
-A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)
CO7

9 pts

Meets or Exceeds

Student submission clearly identifies the Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

6 pts

In Progress

Student submission mostly contains identification of Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

3 pts

Little Evidence

Student submission is off topic or does not clearly provide identification of needed technical safeguards or is incomplete or inaccurate

0 pts

No Evidence

Student submission does not clearly meet expectations for technical safeguards as part of Cybersecurity Plan or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: New Policy

Cybersecurity Plan: New Policy
-outlines policy for working remotely
-includes requirement of using virtual private network (VPN) for employee secure access
CO7

10 pts

Meets or Exceeds

Student submission has outlined a new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub

7 pts

In Progress

Student submission contains an outline for the new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub – this may be missing minor aspects or needs some clarity

4 pts

Little Evidence

Student submission is off topic or does not clearly give a detailed outline for a remote work policy where employees would utilize a virtual private network (VPN) to login and complete their work

0 pts

No Evidence

Student submission does not clearly meet expectations to provide policy outline for remote work or nothing is submitted

10 pts

Total Points: 35

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

English Homework

See Attachment  Assignment 4: Rough Draft (Week 6) Hide Assignment Informa!on Turnitin™ This assignment will be submitted to Turnitin™. Instructions Assignments Assignment 4: Rough Draft (Week 6) Rough Draft of the Final Research Project Submit your rough draft for feedback. The Final Research Project will be 20-25 pages and due

Log

Complete the Log form based on Prospectus Form Integrative Review Appraisal Results Log Student Name: Review Question: *Only add sources that have an appraisal rating of “High” or “Good” to the below table. ** If you can justify the additions of a sources below a “Good “ rating consult with

Module 8

 After reading Chapter 8 and reviewing the Communication Technique handout, select 5 effective listening skills and write 1 script in which all the listening skills are used properly. Be sure to label the listening skills in the script. Post your script to the discussion board by 11.59 pm on March

watching a movie

This paper will be based on watching a movie of your choice: • Driving Ms. Daisy • Something New • Miss India America • Ghandi • Bride and Prejudice • Little White Lie • Beautiful Boxer • Dukhtar • Guess Who  2. Remember to use APA format 7th ed with

case study 2

  Case studies will offer students the opportunity to explore how lessons learned from class can be applied to real world situations. Case studies can illustrate theories, concepts, methodologies, solutions, and more. We will use case studies in the class to evaluate employee perceptions, motivations, and behaviors. Please refer to

Artificial Intelligence in Digital Leadership Reflection

 Artificial Intelligence in Digital Leadership Reflection  Week 8: Artificial Intelligence in Digital Leadership Reflection Artificial Intelligence in Digital Leadership Reflection We have been discussing artificial intelligence and its impact on digital leadership. You have taken your chosen company through several analyses in the digital transformation process. Instructions Complete the following

engl (el)

Part A Reflection #7: Using GenAI When Revising Reflection is an essential part of the learning process. It encourages us to become more self-aware about our knowledge or lack of it; it helps us remember what we have learned so we can make improvements. When we reflect, it allows us

European Imperalism Project Presentation

 The final project for this module will be for you to select one time period from the options provided and create a presentation of your choice highlighting specific topics about the time period while highlighting the theme of Corruption and Independence. Upon completion, upload your project. You may not use any

english

Ratio Analysis RATIO ANALYSIS 1) Ratios 2) Grade Industry Standards 2019 2020 2019 2020 Liquidity ratios: Current ratio 5.00 6 4 Good Quick ratio 3.00 Poor Activity ratios: Inventory turnover 2.20 Days sales outstanding 90.00 Fixed asset turnover 1.00 Total asset turnover 0.75 RATIO FORMULAS Profitability ratios: CURRENT RATIO :

Please see attached docs

Purpose: Deliver a presentation that demonstrates your ability to use moral imagination, structured decision-making, and ethical leadership principles to address a real-world challenge or opportunity in your organization. The presentation should communicate your innovative solution, implementation plan, and the anticipated impact to key stakeholders.   Instructions: Using the attached outline

LE 21

Need help with a topic, will share the instructions with the right person.

LE 23

Need help with a topic, will share the instructions with the right person.

LE 22

Need help with a topic, will share the instructions with the right person.

English comparison assignment

Create a draft from this outline The special skills of two special basketball players. LeBron James is known and acknowledged as one of the best players of today because he’s an all-around player. Michael Jordan is known as the best of the late 80’s and 90’s because how good and

Need to fix

Need to fix and check and remove plagarism check need today. please fix and writind no pla They Say, Who Cares, and So What Analysis 1. What is the “They Say” to which each writer is responding? Kirschner & De Bruyckere Kirschner and De Bruyckere respond to the widespread belief

english last minute paragraph

Please submit as a Word or PDF document your · Response Paragraph  (agree or disagree) paragraph for “Your Children’s Smartphones Aren’t Making Them Smarter”.  This is the final product of the plan that you submitted last week –be sure to try to follow the outline as best as you can.  Remember: you are

E1301_E1

Need help with a question. Essay #1: Summary & Response: Mr. Death Essay #1 Due: Sunday, 3/1 @ 11:00 PM Formatting & Citation: Make sure the essay adheres to MLA formatting guidelines. Make sure to cite the film and any other sources consulted using MLA citation procedures. Length: The summary