Case Study cybersecurity scenario and identify which principles were violated

Anonymous
timer Asked: Nov 13th, 2017
account_balance_wallet $40

Question Description

This case study analysis will help you analyze a cybersecurity scenario and identify which principles were violated. Each skill in this paper is an essential part of the final project and accompanying milestones in this course. Prompt: Use the articles from the Module Three required resources to analyze the cybersecurity occurrence, determine which principles were violated, and recommend appropriate policies to prevent recurrence. Scenario: In February 2015, as many as 80 million customers of the nation’s second-largest health insurance company, Anthem Inc., had their account information stolen. This compromise affected customers in at least 14 different states where Anthem provided services. The hackers gained access to Anthem’s computer system and got information including names, birthdays, medical IDs, Social Security numbers, street addresses, email addresses, and employment information including income data. Both current and former customers were exposed during this breach. So, while this was an attack against a medical provider and it resulted in a massive data breach, regulatory requirements were not sufficient to help prevent this breach. Because no actual medical information appears to have been stolen, the breach would not come under Health Insurance Portability and Accountability Act (HIPAA) rules, which govern the confidentiality and security of medical information.

Unformatted Attachment Preview

IT 380 Module Three Case Study Analysis Guidelines and Rubric Overview: This case study analysis will help you analyze a cybersecurity scenario and identify which principles were violated. Each skill in this paper is an essential part of the final project and accompanying milestones in this course. Prompt: Use the articles from the Module Three required resources to analyze the cybersecurity occurrence, determine which principles were violated, and recommend appropriate policies to prevent recurrence. Scenario: In February 2015, as many as 80 million customers of the nation’s second-largest health insurance company, Anthem Inc., had their account information stolen. This compromise affected customers in at least 14 different states where Anthem provided services. The hackers gained access to Anthem’s computer system and got information including names, birthdays, medical IDs, Social Security numbers, street addresses, email addresses, and employment information including income data. Both current and former customers were exposed during this breach. So, while this was an attack against a medical provider and it resulted in a massive data breach, regulatory requirements were not sufficient to help prevent this breach. Because no actual medical information appears to have been stolen, the breach would not come under Health Insurance Portability and Accountability Act (HIPAA) rules, which govern the confidentiality and security of medical information. Based on the TestOut sections from this module and the additional module resources you have reviewed, your paper should address the following critical elements:    Identification of cybersecurity principles that were violated and rationale of cause Analysis of cryptography that would have helped prevent this breach Recommendation of additional policies that would have been useful to mitigate the breach or even prevent the breach Rubric Guidelines for Submission: Your paper should be submitted as a 2- to 3-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. All academic sources must be cited following the latest APA guidelines. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions. Critical Elements Identification of Cybersecurity Principles That Were Violated Analysis of Cryptography and Prevention Policy Recommendation Proper Use of Writing, Mechanics, and Grammar Exemplary (100%) Meets “Proficient” criteria and correctly identifies which principles were violated with empirical supporting examples Meets “Proficient” criteria and analysis demonstrates keen insight of cryptography and prevention methods Meets “Proficient” criteria and recommendation demonstrates understanding of policies that would remedy the situation appropriately Paper is free of errors in organization and grammar with applicable sources cited Proficient (90%) Correctly identifies which principles were violated with supporting examples Needs Improvement (70%) Identifies which principles were violated but supporting examples have gaps Not Evident (0%) Does not identify a single principle Analysis demonstrates accurate knowledge of cryptography and prevention methods Analysis demonstrates knowledge of cryptography but needs additional information to support prevention ideas Recommends a single policy to remedy situation but recommendation has gaps in strategic implementation Does not analyze the cryptography and prevention methods 30 Does not recommend any policies 30 Paper contains errors of organization and grammar but errors are limited enough so that entries can be understood; cites applicable sources Paper contains errors of organization and grammar making the content difficult to understand 10 Recommends policies to ensure proper resolution of scenario Paper is mostly free of errors of organization and grammar; errors are marginal and rarely interrupt the flow; cites applicable sources Value 30 Total 100% ...
Purchase answer to see full attachment

Tutor Answer

peachblack
School: University of Virginia

See attached...

flag Report DMCA
Review

Anonymous
awesome work thanks

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors