Solved by verified expert:This case study analysis will help you analyze a cybersecurity scenario and identify which principles were violated. Each skill in this paper is an
essential part of the final project and accompanying milestones in this course.
Prompt: Use the articles from the Module Three required resources to analyze the cybersecurity occurrence, determine which principles were violated, and
recommend appropriate policies to prevent recurrence.
Scenario: In February 2015, as many as 80 million customers of the nation’s second-largest health insurance company, Anthem Inc., had their account
information stolen. This compromise affected customers in at least 14 different states where Anthem provided services.
The hackers gained access to Anthem’s computer system and got information including names, birthdays, medical IDs, Social Security numbers, street addresses,
email addresses, and employment information including income data. Both current and former customers were exposed during this breach.
So, while this was an attack against a medical provider and it resulted in a massive data breach, regulatory requirements were not sufficient to help prevent this
breach. Because no actual medical information appears to have been stolen, the breach would not come under Health Insurance Portability and Accountability
Act (HIPAA) rules, which govern the confidentiality and security of medical information.
it380_module_three_case_study_analysis_guidelines_and_rubric.pdf
Unformatted Attachment Preview
IT 380 Module Three Case Study Analysis Guidelines and Rubric
Overview: This case study analysis will help you analyze a cybersecurity scenario and identify which principles were violated. Each skill in this paper is an
essential part of the final project and accompanying milestones in this course.
Prompt: Use the articles from the Module Three required resources to analyze the cybersecurity occurrence, determine which principles were violated, and
recommend appropriate policies to prevent recurrence.
Scenario: In February 2015, as many as 80 million customers of the nation’s second-largest health insurance company, Anthem Inc., had their account
information stolen. This compromise affected customers in at least 14 different states where Anthem provided services.
The hackers gained access to Anthem’s computer system and got information including names, birthdays, medical IDs, Social Security numbers, street addresses,
email addresses, and employment information including income data. Both current and former customers were exposed during this breach.
So, while this was an attack against a medical provider and it resulted in a massive data breach, regulatory requirements were not sufficient to help prevent this
breach. Because no actual medical information appears to have been stolen, the breach would not come under Health Insurance Portability and Accountability
Act (HIPAA) rules, which govern the confidentiality and security of medical information.
Based on the TestOut sections from this module and the additional module resources you have reviewed, your paper should address the following critical
elements:
Identification of cybersecurity principles that were violated and rationale of cause
Analysis of cryptography that would have helped prevent this breach
Recommendation of additional policies that would have been useful to mitigate the breach or even prevent the breach
Rubric
Guidelines for Submission: Your paper should be submitted as a 2- to 3-page Microsoft Word document with double spacing, 12-point Times New Roman font,
and one-inch margins. All academic sources must be cited following the latest APA guidelines.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
Critical Elements
Identification of
Cybersecurity
Principles That Were
Violated
Analysis of
Cryptography and
Prevention
Policy
Recommendation
Proper Use of
Writing, Mechanics,
and Grammar
Exemplary (100%)
Meets “Proficient” criteria and
correctly identifies which
principles were violated with
empirical supporting examples
Meets “Proficient” criteria and
analysis demonstrates keen
insight of cryptography and
prevention methods
Meets “Proficient” criteria and
recommendation demonstrates
understanding of policies that
would remedy the situation
appropriately
Paper is free of errors in
organization and grammar with
applicable sources cited
Proficient (90%)
Correctly identifies which
principles were violated with
supporting examples
Needs Improvement (70%)
Identifies which principles were
violated but supporting
examples have gaps
Not Evident (0%)
Does not identify a single
principle
Analysis demonstrates accurate
knowledge of cryptography and
prevention methods
Analysis demonstrates
knowledge of cryptography but
needs additional information to
support prevention ideas
Recommends a single policy to
remedy situation but
recommendation has gaps in
strategic implementation
Does not analyze the
cryptography and prevention
methods
30
Does not recommend any
policies
30
Paper contains errors of
organization and grammar but
errors are limited enough so that
entries can be understood; cites
applicable sources
Paper contains errors of
organization and grammar
making the content difficult to
understand
10
Recommends policies to ensure
proper resolution of scenario
Paper is mostly free of errors of
organization and grammar;
errors are marginal and rarely
interrupt the flow; cites
applicable sources
Value
30
Total
100%
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more