About ransomware attacks on hospitals

Assignment Help Basic Computer Science
Reference no: EM132568495

The case

Your organizational is a large hospital system that has just had a huge Ransomware attack. 320,000 patients that their health information may have been exposed in a ransomware attack. The ransomware incident took the network off line for 6 days. Non-emergency medical procedures were cancelled due to the lack of access to the electronic health record system and other computers. Providers and clinicians were forced to pen and paper, to allow patient care to continue. Your organization has been in the news with many negative stories about the cyber breach. As a result, you need to create the following:

1. A cybersecurity breach emergency response plan.

2. A business continuity plan to address this issue new and in the future.

3. A crisis communication team

4. A crisis communications plan

5. The benefits to the organization of these plans and final conclusion

Prepare

Review the selected case study once more.

Mind set

To help you add more insights of other issues that you need to address you need to think about your topic as if your manager told you that you needed to fix issue and answer the following questions:

1. What does the organization have to understand about this issue to really address the topic of Ransomware with hospitals?

2. What variables, issues, phenomenon, models, and theories explain why it is important for organizations to have a cybersecurity breach emergency response plan?

3. What variables, issues, phenomenon, models, and theories explain why it is important for organizations to have a business continuity plan?

4. What variables, issues, phenomenon, models, and theories explain why it is important for organizations to have a crisis communication team and plan?

5. What are the potential consequences for organizations that do not have a cybersecurity breach emergency response plan?

6. What are the potential consequences for organizations a crisis communications team and plan?

Research

Remember, cybersecurity technology generally has a very short lifespan. Therefore, research material should reflect such life. This means the majority of the reference list on the paper should be no more than five years old. That is, technical academic references older than five years (with the exceptions of theoretical underpinnings sources) should be used sparingly.

Tasks

Write an overview of introduction paper explaining what is currently happening. the paper should address the following questions:

1. What are ransomware attacks?

2. How are ransomware attacks occurring on hospitals?

3. What are the costs and impacts of ransomware attacks on hospitals?

4. What are some key statistics and trends about ransomware attacks on hospitals?

Reference no: EM132568495

Questions Cloud

Prepare a privileged psychotherapy note : Based on this week's readings, prepare a privileged psychotherapy note that you would use to document your impressions of therapeutic progress/therapy sessions.
Privacy impact of biometrics access control systems : Research how the U.S. Department of Homeland Security is testing the privacy impact of Biometrics Access Control Systems
Determine the amount that will be reported on culver : Determine the amount that will be reported on Culver's December 31, 2019 and 2020, statements of financial position. (Round answers to 0 decimal places)
Three major facets of environmental sustainability : In response to the following question, state a sentence outline with justification, an introduction and one body paragraph:
About ransomware attacks on hospitals : What are some key statistics and trends about ransomware attacks on hospitals? What are ransomware attacks?
What entry should be made on april : Assuming that the company does not use reversing entries, what entry should be made on April 1, 2018 when the annual interest payment is received?
Find the dollar amount of the cost of goods sold : Cost of goods manufactured for the FY 2018 was $347,000. Use this information to find the dollar amount of the FY 2018 cost of goods sold
What would be the next set of labs you would expect to see : What would be the next set of labs you would expect to see ordered to determine the etiology of the anemia and why? Support with evidence from the literature.
Which of the would be correct for bonita to record in case : Which of the would be correct for Bonita to record in Case I? Relative to an exchange of assets by Bonita Industries. The exchange lacks commercial substance.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd