Start Here Transcript Database Security Assessment You are a contracting officer's technical representative, a security system engineer, at a military hospital. Your department's leaders are adopting...

1 answer below »



  • 12 pages, in the form of a double-spaced Word document with citations in APA format.


    The page count does not include figures, diagrams, tables, or citations.


    Include a minimum of six references.


    Include a reference list with the report.






Start Here Transcript Database Security Assessment You are a contracting officer's technical representative, a security system engineer, at a military hospital. Your department's leaders are adopting a new medical health care database management system. And they've tasked you to create a request for proposal for which different vendors will compete to build and provide to the hospital. A request for proposal, or RFP, is when an organization sends out a request for estimates on performing a function, delivering a technology, or providing a service or augmenting staff. RFPs are tailored to each endeavor but have common components and are important in the world of IT contracting and for procurement and acquisitions. To complete the RFP, you must determine the technical and security specifications for the system. You'll write the requirements for the overall system and also provide evaluation standards that will be used in rating the vendor's performance. Your learning will help you determine your system's requirements. As you discover methods of attack, you'll write prevention and remediation requirements for the vendor to perform. You must identify the different vulnerabilities the database should be hardened against. Modern health care systems incorporate databases for effective and efficient management of patient health care. Databases are vulnerable to cyberattacks and must be designed and built with security controls from the beginning of the life cycle. Although hardening the database early in the life cycle is better, security is often incorporated after deployment, forcing hospital and health care IT professionals to play catch-up. Database security requirements should be defined at the requirements stage of acquisition and procurement. System security engineers and other acquisition personnel can effectively assist vendors in building better health care database systems by specifying security requirements up front within the request for proposal (RFP). In this project, you will be developing an RFP for a new medical health care database management system. Parts of your deliverables will be developed through your learning lab. You will submit the following deliverables for this project: Deliverables · An RFP, about 10 to 12 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report. There are 11 steps in this project. You will begin with the workplace scenario and continue with Step 1: "Provide an Overview for Vendors." Step 1: Provide an Overview for Vendors As the contracting officer's technical representative (COTR), you are the liaison between your hospital and potential vendors. It is your duty to provide vendors with an overview of your organization. To do so, identify information about your hospital. Conduct independent research on hospital database management. Think about the hospital's different organizational needs. What departments or individuals will use the Security Concerns Common to All RDBMSs, and for what purposes? Provide an overview with the types of data that may be stored in the system and the importance of keeping these data secure. Include this information in the RFP. After the overview is complete, move to the next step to provide context for the vendors with an overview of needs. Step 2: Provide Context for the Work Now that you have provided vendors with an overview of your hospital's needs, you will provide the vendors with a context for the work needed. Since you are familiar with the application and implementation, give guidance to the vendors by explaining the attributes of the database and by describing the environment in which it will operate. Details are important in order for the vendors to provide optimal services. It is important to understand the vulnerability of a relational database management system (RDBMS). Read the following resources about RDBMSs. · error handling and information leakage · insecure handling · cross-site scripting (XSS/CSRF) flaws · SQL injections · insecure configuration management · authentication (with a focus on broken authentication) · access control (with a focus on broken access control) Describe the security concepts and concerns for databases. Identify at least three security assurance and security functional requirements for the database that contain information for medical personnel and emergency responders. Include this information in the RFP. In the next step, you will provide security standards for the vendors. Step 3: Provide Vendor Security Standards In the previous step, you added context for the needed work. Now, provide a set of internationally recognized standards that competing vendors will incorporate into the database. These standards will also serve as a checklist to measure security performance and security processes. Read the following resources to prepare: · database models · Common Criteria (CC) for information technology security evaluation · evaluated assurance levels (EALs) · continuity of service Address the concepts and issues with respect to disasters and disaster recovery, mission continuity, threats, and cyberattacks. Include these security standards in the RFP. In the next step, you will describe defense models for the RFP. Step 4: Describe Defense Models Now that you have established security standards for the RFP, you will define the use of defense models. This information is important since the networking environment will have numerous users with different levels of access. Provide requirements in the RFP for the vendor to state its overall strategy for defensive principles. Explain the importance of understanding these principles. To further your understanding, click the link and read about defensive principles. Read these resources on enclave computing environment: · enclave/computing environment · cyber operations in DoD policy and plans Explain how enclave computing relates to defensive principles. The network domains should be at different security levels, have different levels of access, and different read and write permissions.  Define enclave computing boundary defense. Include enclave firewalls to separate databases and networks. Define the different environments you expect the databases to be working in and the security policies applicable. Provide this information in the RFP. In the next step, you will consider database defenses. Step 5: Explore Database Defensive Methods Step 6: Provide a Requirement Statement for System Structure In the previous step, you identified defense requirements for the vendor. In this step of the RFP, you will focus on the structure of the system. Provide requirement statements for a web interface to: 1. Allow patients and other health care providers to view, modify, and update the database. 2. Allow integrated access across multiple systems. 3. Prevent data exfiltration through external media. State these requirements in the context of the medical database. Include this information in the RFP. In the next step, you will outline operating system security components. Step 7: Provide Operating System Security Components In the previous step, you composed requirement statements regarding the system setup. In this step, you will provide the operating system security components that will support the database and the security protection mechanisms. Read these resources on operating system security. Then: 1. Provide requirements for segmentation by operating system rings to ensure processes do not affect each other. 2. Provide one example of a process that could violate the segmentation mechanism. Ensure your requirement statements prevent such a violation from occurring. Specify requirement statements that include a trusted platform module (TPM), in which a cryptographic key is supplied at the chip level. In those specifications: 1. Describe the expected security gain from incorporating TPM. 2. Provide requirement statements that adhere to the trusted computing base (TCB) standard. 3. Provide examples of components to consider in the TCB. 4. Provide requirements of how to ensure protection of these components, such as authentication procedures and malware protection. Read the following resources to familiarize yourself with these concepts: · trusted computing · trusted computing base Include this information in the RFP. In the following step, you will write requirements for levels of security. Step 8: Write Requirements for Multiple Independent Levels of Security The previous step required you to identify operating system security components to support the database. For this step, you will focus on identification, authentication, and access. Access to the data is accomplished using security concepts and security models that ensure confidentiality and integrity of the data. Refer to access control and authentication to refresh your knowledge. The healthcare database should be able to incorporate multiple independent levels of security (MILS) because the organization plans to expand the number of users. Write requirement statements for MILS for your database in the RFP. 1. Include the definitions and stipulations for cybersecurity models, including the Biba Integrity Model, Bell-LaPadula Model, and the Chinese Wall Model. 2. Indicate any limitations for the application of these models. Read the following resources and note which cybersecurity models are most beneficial to your database: · multiple independent levels of security (MILS) · cybersecurity models · insecure handling Include requirement statements for addressing insecure handling of data. Include this information in your RFP. In the next step, you will consider access control. Step 9: Include Access Control Concepts, Capabilities In the previous step, you wrote requirements for multiple levels of security, including the topics of identification, authentication, and access. In this step, you will focus on access control. The vendor will need to demonstrate capabilities to enforce identification, authentication, access, and authorization to the database management systems. Include requirement statements in the RFP that the vendor must identify, the types of access control capabilities, and how they execute access control. Provide requirement statements for the vendor regarding access control concepts, authentication, and direct object access. Include the requirement statements in the RFP. In the next step, you will incorporate additional security requirements and request vendors to provide a test plan. Step 10: Include Test Plan Requirements In the previous step, you defined access control requirements. Here, you will define test plan requirements for vendors. Incorporate a short paragraph requiring the vendor to propose a test plan after reviewing these guidelines for a test and remediation results (TPRR) report. Provide requirements for the vendor to supply an approximate timeline for the delivery of technology.  Step 11: Compile the RFP Document In this final step, you will compile the RFP for a secure health care database management system. Review the document to make sure nothing is missed before submission. Submit the following deliverables to your assignment folder. Deliverables · An RFP, about 10 to 12 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report. · An MS-Excel spreadsheet with lab results. 1 12 Request for Proposal: Database Management System First Name Last Name University of Maryland Global Campus
Answered 13 days AfterAug 19, 2021

Answer To: Start Here Transcript Database Security Assessment You are a contracting officer's technical...

Neha answered on Sep 01 2021
138 Votes
Request for Proposal
In this report we will discuss about hospital team. This hospital is led by the security system engineer. This request for proposal includes the overview about the organization and its requirement. It has test plan and remediation results. The security system engineer wants to hire a vendor which is able to provide a system for database management. The vendor should have complete information about the database management system and related security concerns. The team should be able to find out all the technical and security specifications.
It should have the test plan which can be easily incorporated in the system. The
request for proposal should have the specification about database management and the test plan. The request for proposal generally includes the overview about the organization, functional requirements for the database system, security standards, defensive methods and models, access control, levels of the security, DBMS structure, and test plan and remediation results. In this report it shows request for proposal which will be shared by different vendors and get idea from them. These ideas can be used further to select the best solution and get the solution ready on time.
Overview
The hospitals have become an important part of our life thanks they are used for providing the medical facilities to the people who are suffering from different ailments. These elements can be due to the change in the climatic conditions, emotional trauma, increase workload on any type of stress.
It is required for the hospitals who manage their regular activities and also record the information about patients former nurses comment doctors and all the staff members who are working in the hospital and helping them to run the hospital smoothly. it is not possible to keep this information on paper and it becomes very cumbersome and error prone. It is are time consuming process and also inefficient. There is continuous increase in the population and the people are more often visiting hospital.
It is very important to maintain and record all the information about their treatments which are provided to the patients but it is not feasible to maintain the records on the paper. Hence there is the requirement of our database management system which will be able to store all the information in the database and this database can be used by the team members to analyse the report and study about any case starting. In this request for proposal it asks to develop a system and provide the security specification for the same.
Hospital Database Management
The hospitals have become key institutions and there is the requirement of efficient service delivery in the hospitals. The good health is the paramount to have a happy society and hospitals play an important role to provide the good health. As a result, there is a need of the system which can allow the hospital management team to make efficient and effective decisions. Currently their efforts are made to design and construct a reliable and user-friendly database system which is able to satisfy the needs of medical management system or the hospital management system.
In the other scenario there are many medical centres and the hospitals which are adopting manual system for the hospital management. These methods are used in the hospital, but they have created a lot of problems and setbacks for the nurses, doctors and patients. There are many large organizations which need their database system to handle the large amount of information. One type of those enterprises the hospital. There are large number of the doctors staff members and patients who are present in the hospital and this processing of large information is becoming more crucial.
The data management can be used in the hospital to achieve the information of patient, arrange schedule of the doctor and account business. The doctors should be able to access information about the patient to provide the best diagnosis for their disease. The patients should also be able to check the results of their lab test and different types of the information which is provided by the doctors. This database can be useful for the hospital to control the accounting business more efficiently and easily.
The database management system will have all the information like the diagnosis of the patient survey or any prescription. All the information present in the database will have prescription survey and diagnosis of the patient. The doctor and patient will be able to access the information related to them. The patient will be able to take the appointment time to visit the doctor and they will be able to access the information. The administration will be able to access the statistics of the hospital like the number of employees, patient capacity and other related things.
Hospital Data
The hospital has structured data and unstructured data as well. The doctors may provide prescription in a different format, and it will be counted as the unstructured data. The database will have audio files, video files and the images also along with their text. There are different methods which can be used to collect the data for the hospital database. We can use observation method in which the researchers will come to the hospital multiple times for observing and analysing the mode of the operation which is done by the management.
Second method is to conduct the interview in which there will be a schedule for the interview and doctors will provide the facts which can be used to create a new system. We can also get the information from published sources. The information can be collected from different existing publication on the related subject. There are many books which are published over database management in the hospital, and they can be consulted to get the information which will be required to design the new system. Another method is to have documentation and events in the hospital. There are many hospitals which are adopting the manual system and it will be a problematic scenario for the nurses, patients or the doctors who are working in the hospital. It is a very good example to get an automated system for managing the data of the hospital.
DBMS Requirements
DBMS Operating Environment
We can use MySQL for the database management system. It is the relational database management system which is based on the structured query language. This application is generally used for different purposes which...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here