Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Case Study

 Case Study  

Module 7: A Case for Hackers

For this assignment, you will need to review the Case Study presented and 
develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

 Expand AllPanels Collapse AllPanels


Case Study

Lee Hospital is a large hospital system located in a large metropolitan area, well known for their use of cutting-edge advanced technological tools and patient care services. Several of the departments that are not patient facing allow their employees to work remotely with the exceptions of the annual two-day training event for non-leadership and for specialized training on information systems as needed. The hospital has experienced a significant cyber-attack that halted all operations for several hours when the network went down and exposed patient information. This attack revealed critical weaknesses in Lee Hospital’s cybersecurity infrastructure, including outdated antivirus software, weak password policies and identified that there is not a remote work policy.


Action Plan

As the Chief Security Officer at Lee Hospital, you have been asked to develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

Steps you will complete the following as part developing your cybersecurity plan include:

1. A risk assessment to determine and prioritize potential cybersecurity threats with 2-4 strategies to mitigate the threats.

2. Accounting for technical safeguards, such as a multi-factor authentication and schedule for routine updates/patches.

3. Outlining a new policy for working remotely that includes the use of a virtual private network to gain access to the employee work hub instead of simply logging into the hospital’s intranet.

Your deliverable method will be in the form one-to-one-and-a-half-page report that outlines each of the cybersecurity plan steps you completed with your recommendations for addressing the threats, technical safeguards and outline of what a remote work policy would include to limit exposing the network to threats. Your report will be double-spaced.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M7 A Case for Hackers

M7 A Case for Hackers

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Report (paper)
-Uses standard double-spacing without extra spaces between paragraphs
-Minimum length 1 page, maximum length 1.5 pages
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable -Uses standard double-spacing without extra spaces between paragraphs -Minimum length 1 page, maximum length 1.5 pages

5 pts

In Progress

Student submission mostly meets paper parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable -Is either short or over by 0.25 (1/4) of minimum/maximum page requirement

2 pts

Little Evidence

Student submission does not clearly meet the paper parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable -Is either short or over by 0.5 (1/2) of minimum/maximum page requirement

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Risk Assessment

Cybersecurity Plan: Risk Assessment
-Risk Analysis identifies potential cybersecurity threats
-Includes 2-4 strategies to mitigate threats
CO7

9 pts

Meets or Exceeds

Student submission clearly includes -Risk Analysis identifies potential cybersecurity threats -Includes 2-4 strategies to mitigate threats

6 pts

In Progress

Student submission mostly identifies the potential cybersecurity threats with strategies to mitigate threats – may be lacking complete strategies

3 pts

Little Evidence

Student submission is off topic or does not clearly identify cybersecurity threats and strategies to mitigate as part of the Risk Assessment

0 pts

No Evidence

Student submission does not clearly meet the expectations for an assessment of potential cybersecurity threats with mitigation strategies or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Technical Safeguards

Cybersecurity Plan: Technical Safeguards
-A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)
CO7

9 pts

Meets or Exceeds

Student submission clearly identifies the Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

6 pts

In Progress

Student submission mostly contains identification of Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

3 pts

Little Evidence

Student submission is off topic or does not clearly provide identification of needed technical safeguards or is incomplete or inaccurate

0 pts

No Evidence

Student submission does not clearly meet expectations for technical safeguards as part of Cybersecurity Plan or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: New Policy

Cybersecurity Plan: New Policy
-outlines policy for working remotely
-includes requirement of using virtual private network (VPN) for employee secure access
CO7

10 pts

Meets or Exceeds

Student submission has outlined a new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub

7 pts

In Progress

Student submission contains an outline for the new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub – this may be missing minor aspects or needs some clarity

4 pts

Little Evidence

Student submission is off topic or does not clearly give a detailed outline for a remote work policy where employees would utilize a virtual private network (VPN) to login and complete their work

0 pts

No Evidence

Student submission does not clearly meet expectations to provide policy outline for remote work or nothing is submitted

10 pts

Total Points: 35

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

help

study help Please use  professional grammar and punctuation in this college level course in all correspondence.  Please avoid “text” or “twitter speak” when corresponding. Grammar counts here.  Please number your answers.  Do your own work using your own capable brain, you should not need outside resources here.  If you use outside

engl 045 (nc)

2.1 Thesis Statement Assignment (in Two Parts) Thesis statements are like movie, video game, and television series trailers; they give the viewer an insight into the film, video game, or television series and its main points and themes. Thinking like a trailer editor helps you identify the main argument of

Research Rough Draft And Final Copy

How does social media affect mental health in teenagers and young adults? THESIS: Social media negativity affects the mental health of teenagers and young adults

Research Rough Draft and Final Copy

How does social media affect mental health in teenagers and young adults? THESIS: Social media negativity affects the mental health of teenagers and young adults

E1301_1

Need help with a question Professor MWP #3 Rough Draft Instructions Length and Formatting: 6-8 pages, typed, double-spaced, with a left-justified margin, black 12-point, Times New Roman font, written in 3rd person. Assignment : Submit a completed version of your paper following the containments of the essay’s instructions. What is

engl 045 111

Part A Reflection Journal #4: Annotation and/or Writing an Introduction Paragraph Reflection is an essential part of the learning process. It encourages us to become more self-aware about our knowledge or lack of it; it helps us remember what we have learned so we can make improvements. When we reflect,

english

need help organizing ideas  Understanding a Writing Prompt Overview for Writing Prompts Before you can choose an effective topic or viewpoint, you need to know the purpose of the assignment and its requirements. Types of writing assignments can vary from department to department, class to class, instructor to instructor, and

Week 6

 leaders determine the situation was entering chaos  Write a 3-5 page essay (double-spaced, in APA format) in which you consider any TWO of the following questions. 1. Have you personally witnessed a crisis in your organization? 2. When did your leaders determine the situation was entering chaos? 3. How can

Engl 045

Use your “Credibility & Validity” instructions and evaluation chart information, and write an ACES analysis which discusses what makes Brandon Swenson’s article “Technology: The Good, The Bad, The Ugly” credible and valid.  Remember to introduce the author and title, answer your prompt’s question using the prompt’s language, cite a quote

Individual Course Project Outline

  Individual Course Project Outline Week 2: Individual Course Project Outline A one-page Course Project outline is due this week. Include the main topic and the ancillary topics that you will include as part of your consultation recommendation (Refer to the  Individual Course Project Overview ). Include any assumptions you

engl module 4

This assignment has 3 parts Part A ASSIGNMENT 1.3: ✍️Reflection Journal #1: Writing Experiences Reflection Journal #1: Reflection is an essential part of the learning process. It encourages us to become more self-aware about our knowledge or lack of it; it helps us remember what we have learned so we

engl 111 module 3 Per

Part A Mandatory draft of the rhetorical analysis Instructions Important: this draft uses the same ad that you did the earlier prewriting on. Build on that earlier thinking but don’t simply copy and paste it! Prewriting is loose, thinking heavy, while drafting is simply a formal / top-down organization of

ENGL205 WEEK3 D

SEE ATTACHMENT Week 3 Assignment: Sin and Redemption Dialogue For this week’s discussion, respond to the following: How did Thomas Malory use the Christian story of sin and redemption to shape his narrative about King Arthur in Le Morte D’Arthur? Use a specific character in a specific scene as the

ENGL205 A

SEE ATTACHMENTS Assignment. Write a 750-1250 word essay doing a literary analysis explaining the significance of a single passage, scene, or episode in relation to the whole of one of the works of literature (or excerpts) from the course. Talk about the whole work, but focus on the one passage,

ENGL205 WEEK2

NEED TONIGHT For this week’s discussion, choose either The Inferno or “The Dream of the Rood.” Using one specific scene in either work, explain how a Christian view of heroism considers and responds to the ancient problem of sin and our need for redemption. All posts should be grounded in