Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Case Study

 Case Study  

Module 7: A Case for Hackers

For this assignment, you will need to review the Case Study presented and 
develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

 Expand AllPanels Collapse AllPanels


Case Study

Lee Hospital is a large hospital system located in a large metropolitan area, well known for their use of cutting-edge advanced technological tools and patient care services. Several of the departments that are not patient facing allow their employees to work remotely with the exceptions of the annual two-day training event for non-leadership and for specialized training on information systems as needed. The hospital has experienced a significant cyber-attack that halted all operations for several hours when the network went down and exposed patient information. This attack revealed critical weaknesses in Lee Hospital’s cybersecurity infrastructure, including outdated antivirus software, weak password policies and identified that there is not a remote work policy.


Action Plan

As the Chief Security Officer at Lee Hospital, you have been asked to develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

Steps you will complete the following as part developing your cybersecurity plan include:

1. A risk assessment to determine and prioritize potential cybersecurity threats with 2-4 strategies to mitigate the threats.

2. Accounting for technical safeguards, such as a multi-factor authentication and schedule for routine updates/patches.

3. Outlining a new policy for working remotely that includes the use of a virtual private network to gain access to the employee work hub instead of simply logging into the hospital’s intranet.

Your deliverable method will be in the form one-to-one-and-a-half-page report that outlines each of the cybersecurity plan steps you completed with your recommendations for addressing the threats, technical safeguards and outline of what a remote work policy would include to limit exposing the network to threats. Your report will be double-spaced.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M7 A Case for Hackers

M7 A Case for Hackers

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Report (paper)
-Uses standard double-spacing without extra spaces between paragraphs
-Minimum length 1 page, maximum length 1.5 pages
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable -Uses standard double-spacing without extra spaces between paragraphs -Minimum length 1 page, maximum length 1.5 pages

5 pts

In Progress

Student submission mostly meets paper parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable -Is either short or over by 0.25 (1/4) of minimum/maximum page requirement

2 pts

Little Evidence

Student submission does not clearly meet the paper parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable -Is either short or over by 0.5 (1/2) of minimum/maximum page requirement

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Risk Assessment

Cybersecurity Plan: Risk Assessment
-Risk Analysis identifies potential cybersecurity threats
-Includes 2-4 strategies to mitigate threats
CO7

9 pts

Meets or Exceeds

Student submission clearly includes -Risk Analysis identifies potential cybersecurity threats -Includes 2-4 strategies to mitigate threats

6 pts

In Progress

Student submission mostly identifies the potential cybersecurity threats with strategies to mitigate threats – may be lacking complete strategies

3 pts

Little Evidence

Student submission is off topic or does not clearly identify cybersecurity threats and strategies to mitigate as part of the Risk Assessment

0 pts

No Evidence

Student submission does not clearly meet the expectations for an assessment of potential cybersecurity threats with mitigation strategies or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Technical Safeguards

Cybersecurity Plan: Technical Safeguards
-A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)
CO7

9 pts

Meets or Exceeds

Student submission clearly identifies the Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

6 pts

In Progress

Student submission mostly contains identification of Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

3 pts

Little Evidence

Student submission is off topic or does not clearly provide identification of needed technical safeguards or is incomplete or inaccurate

0 pts

No Evidence

Student submission does not clearly meet expectations for technical safeguards as part of Cybersecurity Plan or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: New Policy

Cybersecurity Plan: New Policy
-outlines policy for working remotely
-includes requirement of using virtual private network (VPN) for employee secure access
CO7

10 pts

Meets or Exceeds

Student submission has outlined a new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub

7 pts

In Progress

Student submission contains an outline for the new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub – this may be missing minor aspects or needs some clarity

4 pts

Little Evidence

Student submission is off topic or does not clearly give a detailed outline for a remote work policy where employees would utilize a virtual private network (VPN) to login and complete their work

0 pts

No Evidence

Student submission does not clearly meet expectations to provide policy outline for remote work or nothing is submitted

10 pts

Total Points: 35

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

English Musings Assignment 7

to an external site.  SpMgt 567: Musings Assignment 7 Assignment Directions: 1. For this assignment, please respond to the following question in a 1-page paper. Please use 12-point, Times New Roman font. Please double-space your answer. Please submit your paper in either .doc or .docx format. Please do not submit

english 111 wk 2 (Nic)

Assignment 2.1 Thesis Statements Choose one of the following activities to complete for this assignment. 2.1a – Thesis Statements Mad Libs Using Mad Libs is an interesting and fun way to learn the essential components of sentence structure for kids. However, we can also use them to learn and understand

English

Prewriting for the Toulmin Essay 1. What are five favorite movies, books, games, or TV shows? · The Shawshank Redemption (film) · Black Panther (film) · The Alchemist by Paulo Coelho (book) · The Last of Us (video game) · Breaking Bad (TV show) 2. Choosing one of these, tell

Poem Analysis

Choose a poem and examine how Aristotle’s definition of rhetoric (the faculty of observing, in each particular case, the available means of persuasion) is encapsulated within the poem. Analyze the structure and meaning of the poem. Include the poet’s biographical information as well as the historical background of the poem.

ACES ASSigh

· Write a 150-word-minimum A.C.E.S. analysis based on the article, “Is it Okay to Be Happy When the World is Falling Apart?” by Avram Alpert.   · Your Prompt:  Read the article carefully and discuss any one of the 3 Rhetorical Appeals that shows up in the article (ethos, pathos, and

E1301_FD

Need help with a question 1 Professor Stewart-Steele English 1301 PAPER #2: Analyzing a Visual Representation of a Culture or Ethnic Group Weight: 20% of Final Grade Length and Formatting: 4-5 pages, typed, double-spaced, with a left-justified margin, and black 12-point Times New Roman font, utilizing APA style. Assignment Preparation:

ENGL205

SEE ATTACHED Week 1 Assignment: Hero Dialogue For this week’s discussion, consider either Achilles in The Iliad or Oedipus in Oedipus the King as ancient “heroes” and address the following questions: · What does the hero do to earn that designation? · What are the benefits and burdens that come

ENG

Work attached INSTRUCTIONS Paper #1 (Exposition) Paper #1 is an exposition. Exposition is a form of writing where the main goal is explanation. It will be your job to find and narrow a topic sufficiently so that an in-depth discussion of it is possible in 5 – 8 pages, research

ML2

READ THE ATTACHMENT!!! Rubric A1:COMMUNICATION STRATEGIES EFFECTIVENESS Competent The evaluation logically describes a business situation where the 2 selected organizational communication strategies are used effectively and are in alignment with the situation. A2:COMMUNICATION STRATEGIES ATTRIBUTES Competent The evaluation logically describes 3 attributes that correlate with 1 of the selected communication

Engl 111-045

“SPACE CAT!” is a mnemonic acronym used in  AP English Language and other rhetorical analysis classes to break down the components of a text. It stands for Speaker, Purpose, Audience, Context, Exigence, and Choices, and Tone, helping students understand the rhetorical situation and the author’s choices. This framework provides a structured way

Public debate 2

Just the annotated bibliography  This file is too large to display.View in new window

harry potter

check instruction pdf file 1. Assignment Overview You are to write a 4-page MLA-formatted essay (or make a 5–7 minute presentation) pretending to be a publisher at Bloomsbury Publishing reviewing the manuscript for Harry Potter and the Sorcerer’s Stone. Your job is to decide whether to: ● Publish without change,

study

study Purpose:  The purpose of this assignment is to gain a deeper understanding of how a monopoly can be created by government policy as well as what happens in a monopoly market when other firms begin to enter the market. Skills: This assignment should help you understand what a monopoly

week 3

  needed because you are providing   Select seven scholarly articles that will support your research paper and create an annotated bibliography. For our purposes, think of an annotated bibliography as nothing more than a brief description of what a given resource is about. Each of the seven entries should contain

Coaching Manager and Other Business Leaders

  Explore Human Resources Coaching Manager and Other Business Leaders Week 7: Explore Human Resources: Task 3 – Coaching Manager and Other Business Leaders 90 Points: Task 3 – Coaching Manager and Other Business Leaders What you’ll learn · How compensation frameworks are developed by HR teams · How comparative

Need 3

PART A-It is easy to make statements without facts. However, it is important to remember that statements without facts are simply opinions. For this discussion, find at least two research articles on the importance of using data-driven decision-making in schools. Summarize these articles and create a list of at least

E1301_2

Need help with a question. MWP #2 Rough Draft Instructions Due: 10/16/2025 at 11:20 Length and Formatting: 4-5 pages, typed, double-spaced, with a left-justified margin, and black 12-point Times New Roman font, utilizing APA style. Assignment : Submit a completed version of your paper following the containments of the essay’s