Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Case Study

 Case Study  

Module 7: A Case for Hackers

For this assignment, you will need to review the Case Study presented and 
develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

 Expand AllPanels Collapse AllPanels


Case Study

Lee Hospital is a large hospital system located in a large metropolitan area, well known for their use of cutting-edge advanced technological tools and patient care services. Several of the departments that are not patient facing allow their employees to work remotely with the exceptions of the annual two-day training event for non-leadership and for specialized training on information systems as needed. The hospital has experienced a significant cyber-attack that halted all operations for several hours when the network went down and exposed patient information. This attack revealed critical weaknesses in Lee Hospital’s cybersecurity infrastructure, including outdated antivirus software, weak password policies and identified that there is not a remote work policy.


Action Plan

As the Chief Security Officer at Lee Hospital, you have been asked to develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

Steps you will complete the following as part developing your cybersecurity plan include:

1. A risk assessment to determine and prioritize potential cybersecurity threats with 2-4 strategies to mitigate the threats.

2. Accounting for technical safeguards, such as a multi-factor authentication and schedule for routine updates/patches.

3. Outlining a new policy for working remotely that includes the use of a virtual private network to gain access to the employee work hub instead of simply logging into the hospital’s intranet.

Your deliverable method will be in the form one-to-one-and-a-half-page report that outlines each of the cybersecurity plan steps you completed with your recommendations for addressing the threats, technical safeguards and outline of what a remote work policy would include to limit exposing the network to threats. Your report will be double-spaced.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M7 A Case for Hackers

M7 A Case for Hackers

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Report (paper)
-Uses standard double-spacing without extra spaces between paragraphs
-Minimum length 1 page, maximum length 1.5 pages
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable -Uses standard double-spacing without extra spaces between paragraphs -Minimum length 1 page, maximum length 1.5 pages

5 pts

In Progress

Student submission mostly meets paper parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable -Is either short or over by 0.25 (1/4) of minimum/maximum page requirement

2 pts

Little Evidence

Student submission does not clearly meet the paper parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable -Is either short or over by 0.5 (1/2) of minimum/maximum page requirement

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Risk Assessment

Cybersecurity Plan: Risk Assessment
-Risk Analysis identifies potential cybersecurity threats
-Includes 2-4 strategies to mitigate threats
CO7

9 pts

Meets or Exceeds

Student submission clearly includes -Risk Analysis identifies potential cybersecurity threats -Includes 2-4 strategies to mitigate threats

6 pts

In Progress

Student submission mostly identifies the potential cybersecurity threats with strategies to mitigate threats – may be lacking complete strategies

3 pts

Little Evidence

Student submission is off topic or does not clearly identify cybersecurity threats and strategies to mitigate as part of the Risk Assessment

0 pts

No Evidence

Student submission does not clearly meet the expectations for an assessment of potential cybersecurity threats with mitigation strategies or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Technical Safeguards

Cybersecurity Plan: Technical Safeguards
-A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)
CO7

9 pts

Meets or Exceeds

Student submission clearly identifies the Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

6 pts

In Progress

Student submission mostly contains identification of Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

3 pts

Little Evidence

Student submission is off topic or does not clearly provide identification of needed technical safeguards or is incomplete or inaccurate

0 pts

No Evidence

Student submission does not clearly meet expectations for technical safeguards as part of Cybersecurity Plan or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: New Policy

Cybersecurity Plan: New Policy
-outlines policy for working remotely
-includes requirement of using virtual private network (VPN) for employee secure access
CO7

10 pts

Meets or Exceeds

Student submission has outlined a new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub

7 pts

In Progress

Student submission contains an outline for the new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub – this may be missing minor aspects or needs some clarity

4 pts

Little Evidence

Student submission is off topic or does not clearly give a detailed outline for a remote work policy where employees would utilize a virtual private network (VPN) to login and complete their work

0 pts

No Evidence

Student submission does not clearly meet expectations to provide policy outline for remote work or nothing is submitted

10 pts

Total Points: 35

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

english

We’re sorry but this app doesn’t work properly without JavaScript enabled. Please enable it to continue. MGMT 365 Chapter 5 Fall 2025 Share Thread details Share Embed Report inappropriate content Language: English (US) No results Show related comments Comments by slide Playback speed 1x (normal) Slower Faster 1x Before selecting

Introduction Paragraph

Follow this outline I. Introduction A. Hook: Have you ever bought a shirt that looked great, was super cheap and trendy at first, but then ripped or faded after just one wash? That’s fast fashion. B. Background info: Fast fashion is all about trendy clothes made really fast and sold

Developing Categories for the Literature Review

2 In this discussion topic, we will explore some resources that are designed to help students understand the concept of a  literature review. Please browse these resources and then complete the discussion post below. · the article by Debora F.B. Leite, Maria Auxiliadora Soares Padilha, Jose G. Cecatti, “Approaching Literature Review for

Introduction Paragraph

Outline of Essay    I. Introduction A. Hook: College sports bring in billions through ticket sales, merchandise, and TV deals, yet the athletes themselves rarely see direct financial benefits. B. Background Info: The NCAA currently prevents college athletes from being directly paid, though schools and networks profit heavily. Many athletes

Visual Aid

Attached Why use visual aids? Make ideas clear and understandable 1 Make a speech more interesting 2 Can help an audience remember facts and details 3 Why use visual aids Make long complicated explanations unnecessary 1 Help prove a point 2 Can add to your credibility (if used correctly) 3

FieldWork

(on file) KINESICS: the study of body motion or body behavior. In this assignment, уou will venture out into a рubliс sрaсe (i.e. a сoffee shoр, рark, mall) and observe the рeoрle around уou. Tune out what theу are saуing and then sit baсk and watсh. Take notes on what

Question

Need help with a question Stewart-Steele1 MWP #1: Profile of a Culture or Ethnic Group Weight: 20% of final grade Length and Formatting: 2-3 pages, typed, double-spaced, Black 12-point Times New Roman font, using standard MLA format. Assignment Preparation: Brainstorm about a culture or ethnic group. (Useful for Mind Map

The Six-Source ES

Writing Assignment # 2 The Six-Source Essay: Expanded Synthesis Summary of assignment · Six Source Essay-WA#2-Click on this link! Turnitin™ This assignment will be submitted to Turnitin™. Instructions Instructions You will receive a preliminary grade on your initial draft. The revision is due after receiving instructor feedback and revising the

Preparing for the Six-Source and the Synthesis of Sources

1 Week 4, Discussion 1 — Preparing for the Six-Source Essay and the Synthesis of Sources Essay (Literature Review)   Must post first. Your response to this discussion is  due by this week Friday at 11:59 PM Eastern Standard Time (EST). You are also asked to respond to at least one

W3 1

 Need help with a topic and will share with the right person. 

W3 3

 Need help with a topic and will share with the right person. 

W3 4

 Need help with a topic and will share with the right person. 

W3 2

 Need help with a topic and will share with the right person. 

Notes & Major Points

fastcompany.com What deserves to be in a design museum? Grace Snelling 5–7 minutes At the entrance of the Cooper Hewitt design museum’s latest exhibition, Acquired! Shaping the National Design Collection, two objects sit side-by-side. One is a 3D-printed model of a coronavirus particle, 2020; the other is a turquoise lotus-

Need asap.

Part A – Download the Genogram Template to create a genogram of your family of origin with the career information about your parent(s), sibling(s), aunt(s), uncle(s), and grandparent(s). Initial Post: Along with the Genogram, in your initial post, highlight any patterns of influences you notice about familial career choice along

geog

Lab 1 Using ArcGIS Online Open up a web browser go to: In the upper right corner, click Sign In, be sure to sign in to your account linked with PCC that you set up. Remember your username and password, you will use these throughout the semester. Choose Map from

MS

READ THE ATTACHED FILE!!! Introduction For this task, you will assess your personal leadership effectiveness using emotional intelligence, leadership skills, and character strengths. You will complete three self-assessments for this task: 360° Refined™ Leadership Test, CQ Pro Assessment, and VIA Character Strengths Survey. Additionally, you will write a paper assessing