Goethe University Frankfurt Cyber Security Case Study

User Generated

nanynzzne

Writing

Goethe University Frankfurt

Description

Hi pal,

Here is the instructions for this assignment and I would like you to do part 1 for now:

Description:
Case study on one of the topics relating to the information security field in a business of your choice (either factual or fictional), describe the security issues, attacks and threats, or vulnerabilities the business faces, and security measures and solutions you would recommend. The following links provide many great examples of case studies.

https://www.sans.org/reading-room/whitepapers/case...


https://www.csoonline.com/article/2123346/security...


http://www.cisco.com/en/US/products/hw/vpndevc/pro...

If you are not familiar with the concept of a case study, make sure to check out the links.

Below are the milestones for the case study.

Proposal (topic description) Part 1

You are asked to submit a one page description/summary on what you are going to focus on in the final project.

Presentation Part 2

You need to prepare a 8-10 minute presentation based on your written report and present

discussion. More details will be provided.

Written report Part

First you need to decide what topics you want to study for your case studies. There are many more resources on the Internet. Feel free to use any resource you like. But the end product, the technical report you turn in should be novel; anything other than your own words should be included with quotes, citations, and references. Any violation of academic integrity will result in a zero grade for the assignment. The important aspect is the content. Your report should be comprehensive but also concise. It is better if you could study a case of which you have firsthand experience or one that you can provide the details like cost-benefit or business impact analysis, how and why you would recommend the chosen security solutions, and any obstacles that might be faced throughout the project. So only a general discussion of a well-known security issue (like passwords or wifi security) may not get full credit or not accepted at all. Last but not least.

Formatting requirements for the word document:

Your submission should be a minimum of four double-spaced pages of text. Additional pages of figures, references and appendices are not included in the 4 pages.

Your report should ideally contain no shorter than 1-page introduction, no shorter than 1 1/2-pages of technical description and discussion, no shorter than 1 1/2-page discussion and conclusion.

Your submission should be submitted as a Microsoft Word file. All text in the manuscript should be double spaced, with a 1 inch margin on all four sides. The paper size should be set to ‘Letter’ (8.5 inches X 11 inches). Manuscripts should be prepared in Times New Roman Font, Font size 12.

Citation: APA 7.0 format (both in-text citations and bibliography should follow the APA requirement). The paper is subject to grade deduction if there are no in-text citations!

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello pal, Find the attached document. Feel free to ask for revisions/ clarifications in case need be. Cheers!!😊

1

Running head: CYBER SECURITY

Cybersecurity
Name
Institution

CYBER SECURITY

2

This cybersecurity case study will discuss a fictional business, Hope Well medical facility,
and medical identity theft. Cybersecurity in healthcare has been a global issue of concern. There
has been an increase in cyber threats in the past decades, and many healthcare facilities are still
struggling to secure patients and facility data from cybercriminals. For example, 115 million
records were breached in 2015, 78 million data being stolen in a single attack. According to HIPAA
Journal, 2020, in 2015, the number of stolen patient’s records was six times that of the previous
five years combined. The situation was worse in 2016, 2017, and 2018. In these cases, identity
theft uses phishing emails to obtain various patients' health information (HIPAA, Journal, 2020).
Therefore, Hope Well Medical facility needs to enhance its data security as it embraces
Information Technological devices like computers and smartphones to store patient data and track
patients' progress. This research will cover the following topics.
Hope Well Medical Identity theft
Medical identity theft refers to using stolen patient medical information to access medical
benefits like drugs, treatment, or insurance billing (Webb, 2007). The information may also be
used for other purposes like ransomware delivery (Clifford, 2016). Furthermore, it could be sold
in the market for medical identity theft and can be used to commit ...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags