Hospital ransomware attack

Assignment Help Basic Computer Science
Reference no: EM132567138

The case

Your organizational is a large hospital system that has just had a huge Ransomware attack. 320,000 patients that their health information may have been exposed in a ransomware attack. The ransomware incident took the network off line for 6 days. Non-emergency medical procedures were cancelled due to the lack of access to the electronic health record system and other computers. Providers and clinicians were forced to pen and paper, to allow patient care to continue. Your organization has been in the news with many negative stories about the cyber breach. As a result, you need to create the following:

1. A cybersecurity breach emergency response plan.

2. A business continuity plan to address this issue new and in the future. 

3. A crisis communication team

4. A crisis communications plan

5. The benefits to the organization of these plans and final conclusion

Prepare

Review the selected case study once more.

Mind set

To help you add more insights of other issues that you need to address you need to think about your topic as if your manager told you that you needed to fix issue and answer the following questions:

1. What does the organization have to understand about this issue to really address the topic of Ransomware with hospitals?

2. What variables, issues, phenomenon, models, and theories explain why it is important for organizations to have a cybersecurity breach emergency response plan?

3. What variables, issues, phenomenon, models, and theories explain why it is important for organizations to have a business continuity plan?

4. What variables, issues, phenomenon, models, and theories explain why it is important for organizations to have a crisis communication team and plan?

5. What are the potential consequences for organizations that do not have a cybersecurity breach emergency response plan?

6. What are the potential consequences for organizations a crisis communications team and plan?

Research

Remember, cybersecurity technology generally has a very short lifespan. Therefore, research material should reflect such life. This means the majority of the reference list on the paper should be no more than five years old. That is, technical academic references older than five years (with the exceptions of theoretical underpinnings sources) should be used sparingly.

Tasks

Write an overview of 1-2 pages introduction paper explaining what is currently happening. the paper should address the following questions:

1. What are ransomware attacks?

2. How are ransomware attacks occurring on hospitals?

3. What are the costs and impacts of ransomware attacks on hospitals?

4. What are some key statistics and trends about ransomware attacks on hospitals?

Reference no: EM132567138

Questions Cloud

Resistor versus time and current in the circuit : Sketch your predictions for the graphs of voltage across the resistor versus time and current in the circuit versus time for the RC circuit.
Calculate Oregano Inc net income : On January 2, 2020, Basil Corp. invested $4,150,000 in Oregano Inc. for 40% of its outstanding common shares. Calculate Oregano Inc net income
Big data analytics in e-healthcare industry : There are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry.
Calculate the amount of charge that will be moved : The amount of charge that must be moved from one side of the capacitor to the other to establish a voltage, V, for a capacitor with capacitance
Hospital ransomware attack : What does the organization have to understand about this issue to really address the topic of Ransomware with hospitals?
Classify all elements of cost into direct and indirect cost : Classify all elements of cost into direct and indirect cost and justify your answer. For example, Testers testing the quality of orange juice are direct labors
What is the terminal voltage vba of the unknown battery : What is the terminal voltage Vba of the "unknown" battery?
What are limitations of using the payback method : Calculate the payback period for each of the three projects. Ignore income taxes. Using the payback? method, which projects should Cranes ?choose?
Similarity between the electron and the x-ray diffraction : Explain The similarity between the electron and the X-ray diffraction patterns of aluminium.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd