Case Study1
Case Study1
Scenario: City Hospital, a large urban hospital, is undergoing a digital transformation. They're
implementing a new Electronic Health Record (EHR) system, expanding their telehealth capabilities, and
connecting various medical devices to a central network. The Chief Information Security Officer (CISO),
Sarah Chen, is tasked with ensuring the security of these new systems and the hospital's existing
infrastructure.
The Challenge: Sarah needs to conduct a thorough risk assessment to identify potential threats and
vulnerabilities before the new systems go live. She knows that failing to do so could lead to significant
financial losses, reputational damage, and even harm to patients. The hospital's existing security
measures are outdated, and the new interconnected systems introduce new complexities.
• People: Doctors, nurses, administrative staff, IT personnel, external contractors (for EHR
implementation), patients.
• Procedures: Standard operating procedures for accessing patient data, incident response plans,
password policies, data backup procedures, telehealth protocols.
• Data: Patient medical records (highly sensitive), financial data, research data, employee
information.
• Software: EHR system, telehealth platform, medical device software, operating systems (servers
and workstations).
• Hardware: Servers, workstations, medical devices (e.g., infusion pumps, ventilators), network
infrastructure (routers, switches), security devices (firewalls, intrusion detection systems).
• Networking: Local Area Network (LAN) connecting hospital departments, Internet connection
for telehealth and administrative functions, cloud-based storage for backups.
Sarah uses a weighted factor analysis to prioritize assets based on their criticality, value, and potential
impact of compromise. Patient medical records are ranked highest, followed by the EHR system and
then critical medical devices. Ransomware attacks targeting the EHR system and data breaches are
considered the most serious threats.
Risk Assessment :
Sarah's team uses a risk matrix to assess the likelihood and impact of each threat exploiting a
vulnerability in a specific asset. They consider existing controls (firewalls, antivirus software, access
control lists) and the potential for mitigation.
1. Based on the scenario, what are the top three most valuable assets at City Hospital and why?
Justify your answer (e.g., impact on revenue, profitability, public image, cost of replacement).
Based on the scenario, what are the top three most valuable assets at City Hospital and
why? Justify your answer (e.g., impact on revenue, profitability, public image, cost of
replacement).
Justification:
Patient Safety and Trust: Patients' well-being and trust are integral to the hospital’s mission and
reputation.
Justification:
Criticality: Patient medical records are essential for diagnosis, treatment, and continuity of care.
Justification:
Operational Dependency: The EHR system integrates and manages critical patient and
operational data. A failure could halt essential hospital functions, including admissions, billing,
and care delivery.
4. Networking (LAN, Internet, Cloud Storage)
Justification:
Justification:
Reputation and Compliance: Incidents involving compromised medical devices can lead to
lawsuits, loss of accreditation, and reputational harm.
2. Identify three specific vulnerabilities that could be exploited by the identified threats. Explain
how each vulnerability could be exploited and the potential consequences.
• physical security: Inadequate security measures can leave hospital facilities and
equipment vulnerable, potentially allowing unauthorized individuals to gain physical
access. This poses significant risks to both patient safety and the integrity of healthcare
operations.
Cyber criminals could encrypt patient data, demanding a ransom for decryption, delaying a
patient care and causing repetitional and financial damage.
3. Propose three specific risk mitigation strategies that Sarah could implement to reduce the
likelihood and impact of the identified threats. Explain how each strategy addresses a specific
threat or vulnerability.
Explanation: isolating medical devices from other networks and ensuring timely updates protect
against unauthorized access and malware infections
4. How would a TVA worksheet help Sarah organize and analyze the information gathered during
the risk identification and assessment process?
The TVA worksheet would enable Sarah to systematically organize, analyze, and prioritize risks,
ensuring a clear path to identifying appropriate mitigation strategies. It serves as both a
planning tool and a communication aid, helping to align technical efforts with broader hospital
objectives. Allows Sarah to evaluate risks by analyzing how threats exploit vulnerabilities in
critical assets.