100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

NR 583NP Week 7 Discussion; Malware.

Rating
-
Sold
-
Pages
2
Uploaded on
03-03-2025
Written in
2024/2025

Follow these guidelines when completing each component of the discussion. Contact your course faculty if you have questions. General Instructions Use the table below to identify the cybersecurity breach assigned based on the first letter of your first name. For example, if your first name is Gilda then your assigned app is malware. Create a fictional scenario involving the assigned breach. First initial of your first name Cybersecurity breach A-E Phishing F-J Malware K-O Ransomware P-S Insider Threat T-Z Spoofing Include the following sections: 1. Application of Course Knowledge: Answer all questions/criteria with explanations and detail. 1. Identify and define your assigned breach. 2. Describe the type of organization in which the breach occurred. 3. Identify who was involved. 4. Describe how the breach occurred. 5. Examine how the threat could impact the organization. Discuss what consequences the breach may cause.

Show more Read less
Institution
Course








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Course

Document information

Uploaded on
March 3, 2025
Number of pages
2
Written in
2024/2025
Type
Other
Person
Unknown

Subjects

Content preview

NR583NP Week 7 Discussion Board

Identify and define your assigned breach.

Malware is my assigned breach. Malware, or malicious
software, is a type of software that is designed to harm a
computer or computer network. Malware can be used to steal
data, gain unauthorized access to systems, or damage a
computer. Some examples of Malware are Viruses, Worms,
Spyware, and Ransomware.
Describe the type of organization in which the
breach occurred.

The type of organization in which the breach occurred is a
medium sized regional hospital with two small, community
hospitals in the organization.
Identify who was involved.

All three hospitals were involved. The ransomware group Black
Cat was responsible for the cyberattack.
Describe how the breach occurred.

The attack occurred through a phishing email. An email was
sent to an employee by a hacker promoting a Taylor Swift
ticket giveaway. Since this employee was a huge Taylor Swift
fan, she clicked the link and entered the giveaway providing
her personal information which included her work email, work
phone number and work address.
Examine how the threat could impact the
organization. Discuss what consequences the breach
may cause.

The attack disrupted operations and impacted all three
hospitals. Patient demographics, payment data and insurance
records were stolen. Patients struggled to get timely access to
care, and billions of dollars stopped flowing to providers. Data
breaches are associated with substantial financial costs, and
each year, they cost the United States healthcare industry
about $6.5 billion (Basil et. al, 2022)
References

Basil, N. N., Ambe, S., Ekhator, C., & Fonkem, E. (2022). Health
CA$22.89
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
studyguider55 Chamberlain College Nursing
Follow You need to be logged in order to follow users or courses
Sold
432
Member since
5 year
Number of followers
313
Documents
1565
Last sold
3 weeks ago
StudyGuider

Study material including course and exam guide for College and University students in the United States.

3.9

121 reviews

5
52
4
27
3
32
2
3
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions