Categories
Health Information Security

Title: Analyzing the Wellstar Health Services Data Breach: A Cybersecurity Failure and Risk Management Perspective “Academic Integrity and Submission Guidelines for Assignment 2”

I need someone to write me an essay following this rubric. It cannot be plagiarized at all. My professor uses turn it in. My topic for the essay is the Wellstar Health Services Data Breach-Georgia (This is a little   summary of it.)
On February 7, 2022, Wellstar Health System found out there was a data breach through email. Someone unauthorized had gained access to two different email accounts. PHI was obtained. The breach had happened two months prior and they found out in February. The PHI was accessed between  December 6, 2021, and January 3, 2022.Once they found out they changed the passwords and locked the emails.
prepare the final report and presentation.  
Develop a written paper that will provide the following sections:
Data Breach Overview: Provide an overview of the data breach incident you selected, the healthcare organization that it occurred at, and indicate if any prior data incidents occurred in that organization previously (Use references to support your claims).
Cybersecurity Failures: Analyze the cybersecurity failures and identify the specific dimension(s) of cybersecurity and their related principles (Hint: McCumber Cube and it’s dimensions + relevant principles on each dimension!) that have been violated during the identified healthcare data breach incident (Use references to support your claims).
Cyber Risk Management: search for a recent industry and/or government reports (i.e. less than three years old) and in your own words (no quotes, but use references to support your claims) identify the cyber risk management factors (Likelihood – also known as ‘rate of occurrence’ + estimated impact) associated with the specific cyber incident that occurred for the healthcare organization you’re investigating. (Use references to support your claims). Include a simple table to highlight the cyber threat, risk description, likelihood, impact, and actions proposed to mitigate that cyber threat in the future.
Describe the three-part test for determining whether the information breached includes PHI: state the answer in your own words (no quotes, use references to support your claims), provide the analysis for each of the three parts test (similar to the second case analysis), was there a HIPAA violation in the particular breach incident? What are the appropriate measures that the healthcare organization should take to mitigate the risk of another data breach incident in the future?
Describe the appropriate breach notification that is required by HIPAA security and privacy. Hint: chapter 3 
Conclusion: In your own words (no quotes!!!), provide a conclusion that summarizes the whole paper.
* Provide at least seven different references, (two or more) academic peer-reviewed, (one or more) government sources and (one or more) industry
In particular, you will need to develop a five- to seven-page document as the final report (not more!) that outlines each of the sections above and provides the details to address the points above. 
Format:
All text in the proposal should be word-processed (letter or correspondence-quality font), New Times Roman or Calibri, 12 point, double space and standard margins. The body of the proposal should be five- to seven-pages long (not including title page, Table of Contents, Reference List, & Certificate of Authorship).
The following information should also be included:
Title page: 
Assignment Name and Number
Name and NSU e-mail
Professor’s name
Class Name and Number (e.g. BSHI-3002 term. year)
Due date
The report should also be done professionally and should include:
Table of Contents (with sections & page numbers identified – Ensure the context text starts on page 1, frontmatter shouldn’t be counted in page numbers)
Page numbers on all pages
Clear and consistent headings of all sections
No running heads
Reference List following APA (At least seven different references)
Professional and appealing document is expected. As required by Code of Student Conduct and Academic Responsibility, please make sure to document appropriately your references and state it in your own words, or put in quotations. 
Deadline:
The assignment is expected to be completed by the deadline scheduled in the syllabus. If emergency occur, please send an email message to nforming that the assignment will not be posted on the due time, prior to the deadline.
Points may be deducted for late submissions.
Submission:
Please submit the assignment in MS Word format (.docx) to the Canvas Assignments Dropbox. A direct link to Assignment Dropbox is provided in the course menu bar on the left.
Please name the files you upload to Assignment Dropbox in the following way: LastName_Assignment2.docx.
So, for example, if Jose Rodriguez, submitting Assignment No. 2 the filename should be: “Rodriguez_Assignment2.docx
College Policy On Standards of Academic Integrity:
Academic integrity is highly valued by the faculty and program, and this course will enforce a firm stand on submitting original work. Acts of plagiarism, whether intentional or accidental, are subject to disciplinary action as a violation of academic integrity. A student who breaches the Code of Conduct may receive academic penalties up to and including dismissal from the program. There is an orientation module in Canvas that covers the general topics to be sure you are aware of various forms of plagiarism, intentional and unintentional. You will also note that an external tool called Turnitin will be attached to written work to check for a similarity index. Copying your own work from another class or sharing materials between students for individual assignments are forms of plagiarism. Working with the Writing and Communications Center may help you avoid accidental situations. In addition, good reference citation, quoting and proper paraphrasing will also enhance your results.
Students’ use of generative artificial intelligence (e.g., ChatGPT, Google Bard, Dall-E, Midjourney, etc.) or similar resources on any coursework or academic assessments without the prior permission of their faculty member, or the use of these resources in any way that violates the academic standards of NSU and/or a student’s academic program, is expressly prohibited.