Preview

Project Report

Good Essays
Open Document
Open Document
4391 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project Report
Introduction:
This case study is on Sunnylake hospital whose EMR database and network was hacked by some unknown hackers and regarding the Disaster faced by sunnylake hospital.
Paul Layman CEO of the sunnylake hospitals is who introduced the EMRs (electronic medical record) system in the hospital and switched the hospital to EMR system from paper work.
One day Paul got an e-mail from unknown user about the network security of their hospital and the hacker demands the ransom of $100k to give the access back. Paul, however, didn’t inform the IT department about the email received as he took that lightly but after few days when the access got denied by all the servers and system, Paul realized that concentration needed to be given to the hackers warning.
Weakness of the hospital lies in the fact that there was lack of skilled IT employs in an organization that were unable to fix the bug created by the hackers, Moreover; security management was not done properly which gave a chance or rather an opportunity to hackers to hack the system. They have the backup but it took time to restore the system to normal again.
This case study of sunnylake hospital reflects some main objectives as: * Mismanagement between IT department and management level. * Auditing of network security is not done properly. * Testing and patching of software time to time.

Business continuity planning: This is way of planning process to ensure that our products and services are delivered every time even at the time of some critical substation, we stand in market without affecting the future of company.
Some of the points which are required for BCP are: * Analysis: The analysis phase is used in development of BCP. * Solution design: The main goal of solution phase is to identify the cost effective disaster recovery * Implementation: In implement phase the execution of the design element is identified in the solution design phase. * Testing and organization

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Disaster recovery and business continuity planning are processes that help organizations prepare for disruptive events. Management's involvement in this process can range from overseeing the plan, to providing input and support, to putting the plan into action during an emergency.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    nt2580 lab 6

    • 1092 Words
    • 5 Pages

    2. What is the difference between a Disaster Recovery Plan and a Business Continuity Plan?…

    • 1092 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Nt2580 Notes

    • 1034 Words
    • 5 Pages

    A plan designed to help an organization continue to operate during and after a disruption…

    • 1034 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Business Continuity and Disaster Recovery Planning Definition Disaster: is a natural or man-caused event that damages property and assets, injures or kills people, and impairs the ability for organizations to continue operating. Business Continuity Planning: is the set of activities required to ensure the continuation of critical business processes when a disaster occurs. Disaster Recovery Planning: is the set of activities concerned with the assessment, salvage, repair, and restoration of damaged facilities and assets that support critical business processes.…

    • 1114 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Bat1 Task 1

    • 1280 Words
    • 6 Pages

    IT staff can diminish security breaches by developing effective ways to teach clinical staff about securing their workstations when not in use. Mandatory in-service and power point presentations would be an effective way to do this. The importance of workstation security, not accessing another employee's computer while in use and not using another employee's password should be discussed. Along with how doing so would be in violation of company policy and the HIPAA Privacy Act. Disciplinary action should also be discussed.…

    • 1280 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    "Once critical functions and processes have been determined the BIA team is then charged with assigning Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) to each function. RTO 's are tiered by their level of criticality. It is important to assign appropriate RTO 's and RPO 's that meet business practices." (Linking Disaster Recovery Time Objectives to Business and Compliance Requirements). As an example, the RTO 's could be classified as:…

    • 1932 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Is 305 Lab 1

    • 538 Words
    • 3 Pages

    The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.…

    • 538 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    One way that EMR benefit patients according to Clayson (2004), is not often discussed, and that would be with the military through Medical Communications for Causality Care (MC4), a system the military uses during medical training exercises.…

    • 1185 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Hippa Tutorials

    • 262 Words
    • 2 Pages

    To maintain the confidentiality of e-PHIs, HIPAA created privacy rule, security rule, and HITECH. These rules help to safeguard patient’s privacy, prevent, detect, and correct security violation. Furthermore, viruses, which are introduced by hackers, can attack the computer systems. Another way to protect patients’ information is to protect buildings, equipment, and software. This is done in order to steal information, either for profit, to make a political point, or for entertainment. Using programs like firewalls, Virtual Private Networks, intrusion detection system, virus detection, cryptography, and content filtering can help to guard against information hackers. As a result, the organization will conserve resources and revenue that would have been lost through this process.…

    • 262 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    The following risks, threats, and vulnerabilities were found in an IT infrastructure. Consider the scenario of a Healthcare provider under HIPPA compliance law and what compliance to HIPPA involves.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    HIPAA Research Paper

    • 564 Words
    • 3 Pages

    All the systems and networks used in hospitals should be protected against hackers by consistently scanning the network for systems and networks for threats and using appropriate and updated anti-virus and anti-malware applications.…

    • 564 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Risk Management Success

    • 1462 Words
    • 5 Pages

    The paper is intended to inform the reader of the steps that a risk management program should take in order to ensure that safety and security are upheld. The security and protection of information is more difficult than ever before due to the expanse of technology that is used in the world. Information can be hacked in to and utilized for fraudulent purposes. Personal information of random populations is sought by convicted felons and illegal organizations for the purpose of identity theft and financial gain. The recent inception of identity theft pays tribute to the realization that modern technology truly presents higher risk in terms of security breaches. Alongside the need for security of information is the protection of safety of both staff and patients alike. This aspect of risk management holds a great amount of weight in terms of evaluating the success of a program, as adverse events can cost an organization their accreditation and often times their funding and viability can be negatively affected. The overall goal for this piece is to discuss risk managements involvement in the handling of infectious waste and the protection of private health information by assessing the role of a risk manager, the objectives set forth for a risk management team, and by reviewing the training provided to employees.…

    • 1462 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Long, P. (2009) London Ambulance Failure: Software Glitch Cripples Ambulance Service. Available at: http://www.wired.com/thisdayintech/tag/london-ambulance-failure/ (Accessed: 3rd March 2012)…

    • 3083 Words
    • 13 Pages
    Best Essays