Page345 of the text book: 1. The securityfirm that employs you has been hired by a new customer. This customer developedin-house, custom application system that archives papers forms in...

1 answer below »

Page 345 of the text book:


1. The security firm that employs you has been hired by a new customer. This customer developed in-house, custom application system that archives papers forms in electronic format, complete with a web-based document locator function that works a fallows: users type in keywords in a search engine, related to the document that they are looking for the application returns several possibilities. User can then click on the appropriate document title, and it downloaded from the back-end database and displayed on the user's screen. It is noteworthy that the user not employees of the company in question. This company offers the application as a third party service. All its clients are medical practices that use the application as on offside electronic medical records solution. They are linked to the application via their Internet connection and a regular web browser.


2. After spending a day with the developer’s responsible for this application reviewing the code, your first recommendation is that since all the information that is transmitted is in fact a Protected Health information (PHI), all transactions should be encrypted. As it presently stands, the application system is sending all the documents between the database server and the user' desktop via HTTP (i.e., in clear text). Write a couple of paragraphs making a case that first thing that should be done to the application system is to retrofit an encryption solution.


3. It is settled that application will be sending all information via HTTPS, the secure version of HTTP that relies on SSL to guarantee confidentiality. You know that there are two choices to set up https: Either use certificates created in-house. Write a couple of paragraphs on the matter, specifically listing the pros and cons of each solution. Finally, make a recommendation of using one or the other method.


4. One the medical practices than contracted to use this application system, as its EMR solution is located outside of the United States, but still requires 128-bit encryption. Explain a paragraph how that can be an issue. Research U.S. Federal Regulations that govern exporting encryption technology on the Internet for more information on this topic if necessary.


5. Another need than you identified trough the audit than you ran against this application system is that e-mails are being sent between clients a managers. However, the integrity and nonrepudiation of the e-mail sent is not currently guaranteed. Write a paragraph to outline a solution that could be deployed to remedy this issue.

Answered Same DayDec 29, 2021

Answer To: Page345 of the text book: 1. The securityfirm that employs you has been hired by a new customer....

David answered on Dec 29 2021
125 Votes
Since all the data is sent on the HTTP and no encryption of data takes place it flaws with the
PHI (Protected Health information)
standard. The very first thing that can be done is to use
HTTPS (hypertext transfer protocol secure) in this the data communicated between the two
parties is encrypted and no hacker can easily see what kind of information is exchanged as in
the case of the HTTP which is letting off the security of the user at a very greater risk.
Since the database is available to the users which can be anyone in the world the hacker or
the person looking for the unauthorized access can access the data as there are no limitations
on the data being provided from the database. The information provided should be limited to
the authorized users only. Logging of the information being passed out to which user should
be logged, if no login information is used then log the IP address of the system. If the SQL
database is not secured or not protected then various types of attacks on the database is also
possible like SQL Injection leading to the garbage information in the database making data
inefficient.
IP address confidentiality: Websites often record the IP addresses of the visitors, as we get
the IP from the ISP the address mainly reveals about the ISP...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here