Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Case Study

 Case Study  

Module 7: A Case for Hackers

For this assignment, you will need to review the Case Study presented and 
develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

 Expand AllPanels Collapse AllPanels


Case Study

Lee Hospital is a large hospital system located in a large metropolitan area, well known for their use of cutting-edge advanced technological tools and patient care services. Several of the departments that are not patient facing allow their employees to work remotely with the exceptions of the annual two-day training event for non-leadership and for specialized training on information systems as needed. The hospital has experienced a significant cyber-attack that halted all operations for several hours when the network went down and exposed patient information. This attack revealed critical weaknesses in Lee Hospital’s cybersecurity infrastructure, including outdated antivirus software, weak password policies and identified that there is not a remote work policy.


Action Plan

As the Chief Security Officer at Lee Hospital, you have been asked to develop a cybersecurity plan that includes preventative measures to protect against cyber threats.

Steps you will complete the following as part developing your cybersecurity plan include:

1. A risk assessment to determine and prioritize potential cybersecurity threats with 2-4 strategies to mitigate the threats.

2. Accounting for technical safeguards, such as a multi-factor authentication and schedule for routine updates/patches.

3. Outlining a new policy for working remotely that includes the use of a virtual private network to gain access to the employee work hub instead of simply logging into the hospital’s intranet.

Your deliverable method will be in the form one-to-one-and-a-half-page report that outlines each of the cybersecurity plan steps you completed with your recommendations for addressing the threats, technical safeguards and outline of what a remote work policy would include to limit exposing the network to threats. Your report will be double-spaced.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M7 A Case for Hackers

M7 A Case for Hackers

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Report (paper)
-Uses standard double-spacing without extra spaces between paragraphs
-Minimum length 1 page, maximum length 1.5 pages
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable -Uses standard double-spacing without extra spaces between paragraphs -Minimum length 1 page, maximum length 1.5 pages

5 pts

In Progress

Student submission mostly meets paper parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable -Is either short or over by 0.25 (1/4) of minimum/maximum page requirement

2 pts

Little Evidence

Student submission does not clearly meet the paper parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable -Is either short or over by 0.5 (1/2) of minimum/maximum page requirement

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Risk Assessment

Cybersecurity Plan: Risk Assessment
-Risk Analysis identifies potential cybersecurity threats
-Includes 2-4 strategies to mitigate threats
CO7

9 pts

Meets or Exceeds

Student submission clearly includes -Risk Analysis identifies potential cybersecurity threats -Includes 2-4 strategies to mitigate threats

6 pts

In Progress

Student submission mostly identifies the potential cybersecurity threats with strategies to mitigate threats – may be lacking complete strategies

3 pts

Little Evidence

Student submission is off topic or does not clearly identify cybersecurity threats and strategies to mitigate as part of the Risk Assessment

0 pts

No Evidence

Student submission does not clearly meet the expectations for an assessment of potential cybersecurity threats with mitigation strategies or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: Technical Safeguards

Cybersecurity Plan: Technical Safeguards
-A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)
CO7

9 pts

Meets or Exceeds

Student submission clearly identifies the Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

6 pts

In Progress

Student submission mostly contains identification of Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches)

3 pts

Little Evidence

Student submission is off topic or does not clearly provide identification of needed technical safeguards or is incomplete or inaccurate

0 pts

No Evidence

Student submission does not clearly meet expectations for technical safeguards as part of Cybersecurity Plan or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCybersecurity Plan: New Policy

Cybersecurity Plan: New Policy
-outlines policy for working remotely
-includes requirement of using virtual private network (VPN) for employee secure access
CO7

10 pts

Meets or Exceeds

Student submission has outlined a new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub

7 pts

In Progress

Student submission contains an outline for the new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub – this may be missing minor aspects or needs some clarity

4 pts

Little Evidence

Student submission is off topic or does not clearly give a detailed outline for a remote work policy where employees would utilize a virtual private network (VPN) to login and complete their work

0 pts

No Evidence

Student submission does not clearly meet expectations to provide policy outline for remote work or nothing is submitted

10 pts

Total Points: 35

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

English Can someone help me with my English compotition homework?

English  ENC 101 ENGLISH COMPOSITION 1 FINAL EXAM ANSWER SHEET Name ____________________________________ Date _________________ Complete all answers on this answer sheet and upload to Blackboard. Verbs (1-10) 1. 6. 2. 7. 3. 8. 4. 9. 5. 10. Punctuation Marks (1-10) 1. 6. 2. 7. 3. 8. 4. 9. 5. 10.

Health

Program: ​ ​ Logic Model (uses text boxes: add/change boxes and arrows as needed) Situation: Inputs Outputs Activities Participation Outcomes Short Medium Long Assumptions External Factors Rev. 7/09

Nexttt

Redo  Required Readings & Resources Kolbert, J., Crothers, L., & Hughes, T. (2022). Introduction to school counseling: Theory, research, and practice (2nd ed.). ● Chapter 1: “History and Trends in the School Counseling Profession” ● Chapter 2: “Professional Identify of School Counselors and the American School Association National Model (2019)”

Asap please.

Thanks  Required Readings & Resources Kolbert, J., Crothers, L., & Hughes, T. (2022). Introduction to school counseling: Theory, research, and practice (2nd ed.). ● Chapter 6: “Individual Counseling” ● Chapter 7: “Group Counseling” Part A-Discussion Topic: Discussion: Counseling Theories in an Academic Setting Discussion: Counseling Theories in an Academic Setting

ASAP 2

Shankss Required Readings & Resources Kolbert, J., Crothers, L., & Hughes, T. (2022). Introduction to school counseling: Theory, research, and practice (2nd ed.). ● Chapter 8: “Consultation and Collaboration” ● Chapter 9: “Academic Development” Part A-Discussion: Engaging with Students Review the Discussion Requirements for this course before responding to the

ar

Use the following questions as a guide as you work to situate this artwork in its geographical context of production. · What kind of features do the figures display?  What are they wearing on their heads?  What kind of beard does the seated figure have? · How are outlines used

I need help d

Answer these using at least 350 words ● What is the policy, program, or policy proposal, and which community/ies is it intended to benefit? ○ This can be a federal or state policy already in place (WIC or TANNF), a community-based or mutual aid program you know of or are

English Homework

Discussion –  You may pick out one topic of the following to discuss: Collaboration  Strategic Sourcing

I need help j4

General Instructions / Formatting Requirements: 1. Respond to only one of the below prompts 2. State the specific prompt you’re responding to at the top of your paper 3. Break up your response into multiple paragraphs 4. Indent each paragraph 5. Double space 6. Proofread for clarity, grammar and spelling

gc

will need speaker notes Create an 8- to 10-slide PowerPoint presentation discussing your cultural background (in addition, you should include a title slide and reference slide in your presentation). When discussing your culture, consider components of yourself such as race, ethnicity, religion, spiritual heritage, gender, sexual orientation, disabilities, socioeconomic status, traditions,

Play

Assignment posted below Scholars, For your last major writing assignment of the semester, you will compose an original scene of a play. In your scene, you must include the following: • Title of your play • clear stage directions • scene descriptions • a list of characters • engaging dialogue

English Homework

Current event Assignment: Chapter 1 – “The Humanities: An introduction “ Objective:   As we delve into the current chapter, this assignment aims to encourage you to make real-world connections to the material we are studying.  Details:   Each student is required to bring in an item that relates to the current

English Homework

Dr. Huston/ENGL 2331-F2-Spring 2024 2 English 2331 Literary Research Project Guidelines Project Slides due date: Sunday, May 5, no later than 11:30 pm Reminder: Late assignments are not accepted. Purpose: This project is intended to provide students with an opportunity to research and independently explore the life and literature of

assitant needed E Kenniqua

please see attachment In-Class Essay – Spring 2024 · Choose one of the following (numbered) prompts to write an essay paragraph. · Make sure your answer has all the features of a strong essay and is written in complete sentences. · Pay special attention to giving support: examples, names, and

How Business Will Harness AI

assignment is attached use the assignment-specific template file in the Assignment Expectations section for all Cases and SLPs in this class. The templates are APA-formatted, may contain links and guidance, and include headings for each required section. The assignment requires research and attribution. It cannot be based on opinion or

final

Behavior Change Campaign Proposal Campaign Proposal Powerpoint Presentation  1 Topic Proposal: Texting While Driving Wenjia Zhang Johns Hopkins University AS.480.602.51.SP25 Changing Behavior through Communication Dr. Willett February 13, 2025 Texting While Driving Introduction Texting while driving is one of the significant risk factors for road accidents. The behavior involves sending