English

Case Study :  Case Study   | English

Case Study   Module77.docx Module 7: A Case for Hackers For this assignment, you will need to review the Case Study presented and  develop a cybe

Jun 02, 2025 1 views

This is a sample solution our expert wrote for a client with similar requirements.

Case Study   Module77.docx Module 7: A Case for Hackers For this assignment, you will need to review the Case Study presented and  develop a cybersecurity plan that includes preventative measures to protect against cyber threats.  Expand AllPanels Collapse AllPanels Case Study Lee Hospital is a large hospital system located in a large metropolitan area, well known for their use of cutting-edge advanced technological tools and patient care services. Several of the departments that are not patient facing allow their employees to work remotely with the exceptions of the annual two-day training event for non-leadership and for specialized training on information systems as needed. The hospital has experienced a significant cyber-attack that halted all operations for several hours when the network went down and exposed patient information. This attack revealed critical weaknesses in Lee Hospital’s cybersecurity infrastructure, including outdated antivirus software, weak password policies and identified that there is not a remote work policy. Action Plan As the Chief Security Officer at Lee Hospital, you have been asked to develop a cybersecurity plan that includes preventative measures to protect against cyber threats. Steps you will complete the following as part developing your cybersecurity plan include: 1. A risk assessment to determine and prioritize potential cybersecurity threats with 2-4 strategies to mitigate the threats. 2. Accounting for technical safeguards, such as a multi-factor authentication and schedule for routine updates/patches. 3. Outlining a new policy for working remotely that includes the use of a virtual private network to gain access to the employee work hub instead of simply logging into the hospital’s intranet. Your deliverable method will be in the form one-to-one-and-a-half-page report that outlines each of the cybersecurity plan steps you completed with your recommendations for addressing the threats, technical safeguards and outline of what a remote work policy would include to limit exposing the network to threats. Your report will be double-spaced. Note: If you utilize your textbook or any references to support your recommendations, provide a reference list. This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage. Action Select the Start Assignment button to begin. Once you have uploaded your file, select Submit Assignment. Rubric M7 A Case for Hackers M7 A Case for Hackers Criteria Ratings Pts This criterion is linked to a Learning OutcomeParameters Parameters Report (paper) -Uses standard double-spacing without extra spaces between paragraphs -Minimum length 1 page, maximum length 1.5 pages -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable 7 pts Meets or Exceeds Student submission clearly encompasses all paper parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable -Uses standard double-spacing without extra spaces between paragraphs -Minimum length 1 page, maximum length 1.5 pages 5 pts In Progress Student submission mostly meets paper parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable -Is either short or over by 0.25 (1/4) of minimum/maximum page requirement 2 pts Little Evidence Student submission does not clearly meet the paper parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable -Is either short or over by 0.5 (1/2) of minimum/maximum page requirement 0 pts No Evidence Student submission clearly does not meet the required Parameters 7 pts This criterion is linked to a Learning OutcomeCybersecurity Plan: Risk Assessment Cybersecurity Plan: Risk Assessment -Risk Analysis identifies potential cybersecurity threats -Includes 2-4 strategies to mitigate threats CO7 9 pts Meets or Exceeds Student submission clearly includes -Risk Analysis identifies potential cybersecurity threats -Includes 2-4 strategies to mitigate threats 6 pts In Progress Student submission mostly identifies the potential cybersecurity threats with strategies to mitigate threats – may be lacking complete strategies 3 pts Little Evidence Student submission is off topic or does not clearly identify cybersecurity threats and strategies to mitigate as part of the Risk Assessment 0 pts No Evidence Student submission does not clearly meet the expectations for an assessment of potential cybersecurity threats with mitigation strategies or nothing submitted 9 pts This criterion is linked to a Learning OutcomeCybersecurity Plan: Technical Safeguards Cybersecurity Plan: Technical Safeguards -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches) CO7 9 pts Meets or Exceeds Student submission clearly identifies the Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches) 6 pts In Progress Student submission mostly contains identification of Technical Safeguards with -A clear accounting for technical safeguards that are needed (such as multi-factor authentication, routine updates schedule, patches) 3 pts Little Evidence Student submission is off topic or does not clearly provide identification of needed technical safeguards or is incomplete or inaccurate 0 pts No Evidence Student submission does not clearly meet expectations for technical safeguards as part of Cybersecurity Plan or nothing submitted 9 pts This criterion is linked to a Learning OutcomeCybersecurity Plan: New Policy Cybersecurity Plan: New Policy -outlines policy for working remotely -includes requirement of using virtual private network (VPN) for employee secure access CO7 10 pts Meets or Exceeds Student submission has outlined a new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub 7 pts In Progress Student submission contains an outline for the new policy for Remote Work that addresses employees utilizing the virtual private network (VPN) for accessing the employee work hub – this may be missing minor aspects or needs some clarity 4 pts Little Evidence Student submission is off topic or does not clearly give a detailed outline for a remote work policy where employees would utilize a virtual private network (VPN) to login and complete their work 0 pts No Evidence Student submission does not clearly meet expectations to provide policy outline for remote work or nothing is submitted 10 pts Total Points: 35

Need a similar assignment?

Our expert writers can help you with your specific requirements. Get started today.

Order Your Custom Solution

Get a Price Estimate

Price Estimate

Deadline.

Number of Pages.

Price: $12

Order Now

Why Students Choose Us

  • Original Work: 100% plagiarism-free with free Turnitin report

  • Unlimited Revisions: Until you're completely satisfied

  • Expert Writers: PhD-qualified in your subject area

  • 24/7 Support: Always available to assist you