Database Security Assessment

Database Security Assessment Transcript You are a contracting officer’s technical representative, a Security System Engineer, at a military hospital. Your department’s leaders are adopting a new medical health care database management system. And they’ve tasked you to create a request for proposal for which different vendors will compete to build and provide to the hospital. A Request For Proposal, or RFP, is when an organization sends out a request for estimates on performing a function, delivering a technology, or providing a service or augmenting staff. RFPs are tailored to each endeavor but have common components and are important in the world of IT contracting and for procurement and acquisitions. To complete the RFP, you must determine the technical and security specifications for the system. You’ll write the requirements for the overall system and also provide evaluation standards that will be used in rating the vendor’s performance. Your learning will help you determine your system’s requirements. As you discover methods of attack, you’ll write prevention and remediation requirements for the vendor to perform. You must identify the different vulnerabilities the database should be hardened against.

Modern healthcare systems incorporate databases for effective and efficient management of patient healthcare. Databases are vulnerable to cyberattacks and must be designed and built with security controls from the beginning of the life cycle. Although hardening the database early in the life cycle is better, security is often incorporated after deployment, forcing hospital and healthcare IT professionals to play catch-up. Database security requirements should be defined at the requirements stage of acquisition and procurement. 

System security engineers and other acquisition personnel can effectively assist vendors in building better healthcare database systems by specifying security requirements up front within the request for proposal (RFP).  In this project, you will be developing an RFP for a new medical healthcare database management system.

Parts of your deliverables will be developed through your learning lab. You will submit the following deliverables for this project:

Deliverables

• An RFP, about 10 to 12 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report.

• An MS-Excel spreadsheet with lab results.

There are 11 steps in this project. You will begin with the workplace scenario and continue with Step 1: “Provide an Overview for Vendors.”

Step 1: Provide an Overview for Vendors

As the contracting officer’s technical representative (COTR), you are the liaison between your hospital and potential vendors. It is your duty to provide vendors with an overview of your organization. To do so, identify information about your hospital. Conduct independent research on hospital database management. Think about the hospital’s different organizational needs. What departments or individuals will use the Security Concerns Common to All RDBMS, and for what purposes?

Provide an overview including the types of data that may be stored in the system and the importance of keeping these data secure. Include this information in the RFP. 

After the overview is complete, move to the next step to provide context for the vendors with an overview of needs.

Step 2: Provide Context for the Work 

Now that you have provided vendors with an overview of your hospital’s needs, you will provide the vendors with a context for the work needed.

Since you are familiar with the application and implementation, give guidance to the vendors by explaining the attributes of the database and by describing the environment in which it will operate.

It is important to understand the vulnerability of a relational database management system (RDBMS). Read the following resources about RDBMSs.

• error handling and information leakage

• insecure handling

• cross-site scripting (XSS/CSRF) flaws

• SQL injections

• memory leakage

• insecure configuration management

• authentication (with a focus on broken authentication)

• access control (with a focus on broken access control)

Describe the security concepts and concerns for databases.

Identify at least three security assurance and security functional requirements for the database that contain information for medical personnel and emergency responders.

Include this information in the RFP.

In the next step, you will provide security standards for the vendors.

Step 3: Provide Vendor Security Standards

In the previous step, you added context for the needed work. Now, provide a set of internationally recognized standards that competing vendors will incorporate into the database. These standards will also serve as a checklist to measure security performance and security processes. 

Read the following resources to prepare:

• Database Models

• Common Criteria (CC) for information technology security evaluation

• evaluated assurance levels (EALs)

• continuity of service

Address the concepts and issues with respect to disasters and disaster recovery, mission continuity, threats, and cyberattacks. 

Include these security standards in the RFP.

In the next step, you will describe defense models for the RFP.

Step 4: Describe Defense Models

Now that you have established security standards for the RFP, you will define the use of defense models. This information is important since the networking environment will have numerous users with different levels of access. 

Provide requirements in the RFP for the vendor to state its overall strategy for defensive principles. Explain the importance of understanding these principles. To further your understanding, click the link and read about defensive principles.

Read these resources on enclave computing environment: 

• enclave/computing environment

• cyber operations in DoD policy and plans

Explain how enclave computing relates to defensive principles. The network domains should be at different security levels, have different levels of access, and different read and write permissions.  

Define enclave computing boundary defense.

Include enclave firewalls to separate databases and networks. 

Define the different environments you expect the databases to be working in and the security policies applicable. 

Provide this information in the RFP. 

In the next step, you will consider database defenses.

Step 6: Provide a Requirement Statement for System Structure

In the previous step, you identified defense requirements for the vendor. In this step of the RFP, you will focus on the structure of the system.

Provide requirement statements for a web interface to:

a. Allow patients and other healthcare providers to view, modify, and update the database. 

b. Allow integrated access across multiple systems.

c. Prevent data exfiltration through external media.

State these requirements in the context of the medical database. Include this information in the RFP. 

In the next step, you will outline operating system security components.

Step 7: Provide Operating System Security Components

In the previous step, you composed requirement statements regarding the system setup. In this step, you will provide the operating system security components that will support the database and the security protection mechanisms. 

Read these resources on operating system security. Then:

a. Provide requirements for segmentation by operating system rings to ensure processes do not affect each other.

b. Provide one example of a process that could violate the segmentation mechanism. Ensure your requirement statements prevent such a violation from occurring.

Specify requirement statements that include a trusted platform module (TPM), in which a cryptographic key is supplied at the chip level. In those specifications:

a. Describe the expected security gain from incorporating TPM.

b. Provide requirement statements that adhere to the trusted computing base (TCB) standard.

c. Provide examples of components to consider in the TCB.

d. Provide requirements of how to ensure protection of these components, such as authentication procedures and malware protection.

Read the following resources to familiarize yourself with these concepts:

• trusted computing

• trusted computing base

Include this information in the RFP. 

In the following step, you will write requirements for levels of security.

Step 8: Write Requirements for Multiple Independent Levels of Security

The previous step required you to identify operating system security components to support the database. For this step, you will focus on identification, authentication, and access. Access to the data is accomplished using security concepts and security models that ensure confidentiality and integrity of the data. Refer to access control and authentication to refresh your knowledge.

The healthcare database should be able to incorporate multiple independent levels of security (MILS) because the organization plans to expand the number of users.

Write requirement statements for MILS for your database in the RFP. 

a. Include the definitions and stipulations for cybersecurity models, including the Biba Integrity Model, Bell-LaPadula Model, and the Chinese Wall Model. 

b. Indicate any limitations for the application of these models. 

Read the following resources and note which cybersecurity models are most beneficial to your database:

• multiple independent levels of security (MILS)

• cybersecurity models

• insecure handling

Include requirement statements for addressing insecure handling of data.

Include this information in your RFP. 

In the next step, you will consider access control.

Step 9: Include Access Control Concepts, Capabilities

In the previous step, you wrote requirements for multiple levels of security, including the topics of identification, authentication, and access. In this step, you will focus on access control. The vendor will need to demonstrate capabilities to enforce identification, authentication, access, and authorization to the database management systems. 

Include requirement statements in the RFP that the vendor must identify, the types of access control capabilities, and how they execute access control.

Provide requirement statements for the vendor regarding access control concepts, authentication, and direct object access. 

Include the requirement statements in the RFP.

In the next step, you will incorporate additional security requirements and request vendors to provide a test plan.

Step 10: Include Test Plan Requirements

In the previous step, you defined access control requirements. Here, you will define test plan requirements for vendors.

Incorporate a short paragraph requiring the vendor to propose a test plan after reviewing these guidelines for a test and remediation results (TPRR) report.

Provide requirements for the vendor to supply an approximate timeline for the delivery of technology. 

Step 11: Compile the RFP Document

In this final step, you will compile the RFP for a secure healthcare database management system. Review the document to make sure nothing is missed before submission. Submit the following deliverables to your assignment folder.

Deliverables:

• An RFP, about 10 to 12 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Using R do Analytics on Emergency Facilities Readiness Project

Use R to do analytics according to instructions which is attached. Write a report as instructed. Need to submit R code and report. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Module 1 Case Project 1-4

A  desperate employee calls because she has accidentally deleted crucial files from her hard drive and can’t retrieve them from the Recycle Bin. What are your options? Write one to two pages explaining your capabilities and listing the questions you need to ask her about her system.

PLEASE NO BOOK REFERENCES ONLY ONLINE WEBSITES AS REFERENCES

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Easy Cyber questions

1. Distinguish between vulnerability, threat, and control.

2. Theft usually results in some kind of harm. For example, if someone steals your car, you may suffer financial loss, inconvenience (by losing your mode of transportation), and emotional upset (because of invasion of your personal property and space). List three kinds of harm a company might experience from theft of computer equipment.

3. List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials.

4. List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised.

5. List at least three kinds of harm a company could encounter from loss of service, that is, failure of availability. List the product or capability to which access is lost, and explain how this loss hurts the company.

6. Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure malicious or not? Did the attack target you specifically or was it general and you were the unfortunate victim?

7. Describe two examples of vulnerabilities in automobiles for which auto manufacturers have instituted controls. Tell why you think these controls are effective, somewhat effective, or ineffective.

8. One control against accidental software deletion is to save all old versions of a program. Of course, this control is prohibitively expensive in terms of cost of storage. Suggest a less costly control against accidental software deletion. Is your control effective against all possible causes of software deletion? If not, what threats does it not cover?

9. On your personal computer, who can install programs? Who can change operating system data? Who can replace portions of the operating system? Can any of these actions be performed remotely?

10. Suppose a program to print paychecks secretly leaks a list of names of employees earning more than a certain amount each month. What controls could be instituted to limit the vulnerability of this leakage?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

6.27 LAB: Exact change – methods

Define a method called exactChange that takes the total change amount in cents and an integer array as parameters. Method exactChange() calculates the change using the fewest coins and stores the number of each coin type used into the array parameter. Index 0-3 of the array parameter should contain the number of pennies, nickels, dimes, and quarters respectively. Then write a main program that reads the total change amount as an integer input, calls exactChange(), and outputs the change, one coin type per line. Use singular and plural coin names as appropriate, like 1 penny vs. 2 pennies. Output “no change” if the input is 0 or less.

Ex: If the input is:

0

(or less), the output is: 

no change

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Timing Issues related to Resourcing Projects

nitial Post Requirement (20 points):  Minimum 300 words.

Review Section 9-3c, CPM 4e.  For the Suburban Homes Construction Project or the Casa De Paz Development Project, describe a timing issue that could occur early in a project and a timing issue that could occur at the end of a project.  Then, discuss how you would address each of these issues.

Response Post Requirement (10 points):  Minimum 150 words.  In the response post, you will provide a counter opinion or alternative point of view, not simply a reaffirmation of the initial discussion post.  The response post can rely entirely on your experience or it can be a combination of your experience supplemented with information learned from the course reading materials and other references.

Assessment: You will be assessed on 1) content and 2) completeness (e.g., use of in-text citation of references used for summarizing, paraphrasing and quoting and other writing mechanics) and word count.

Guidance:  See the Purdue Online Writing Lab (OWL) website for guidance on citations and references.   A copy of the Purdue OWL citation chart is provided in the course home page (Moodle).  Discussion forum content can include a combination of material from literature and your own personal experience.  Do some research and find papers that are associated with the topic of the question.  It is recommended that you use the materials provided in this course and the assigned readings in CPM 4e and the PMBOK 6e for references when appropriate for the question you’ve chosen.  Online blogs are not acceptable references.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

HTML Programming

HTML programming

Create a Design Document, outlining a website with at least 5 pages demonstrating the content from this course, relating to an interest or hobby the student has. 

Include:

· Brief Description of the following pages, including a layout mockup and a color palette 

o 1 text/terms 

o 1 images 

o 1 multimedia page 

o 1 links page 

o 1 user designed 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

3 Discussions and 10 Multiple choice Questions attached

1.2 

Because of the housing bubble, many houses are now selling for much less than their selling price just two to three years ago. There is evidence that homeowners with virtually identical houses tend to ask for more if they paid more for the house. What fallacy are they making?

Discussion 2.1

Children in poor neighborhoods have bleak outlooks on life and do not see much gain to studying. A recent experiment is paying children in poor neighborhoods $100 for each “A” they earn in a six-week grade reporting cycle. How does this affect the children’s behavior?

Discussion 2.2

Probably the most important source of capital is human capital. For example, most medical doctors spend years learning to practice medicine. Doctors are willing to make large investments in their human capital because they expect to be compensated for doing so when they begin work. In Canada, the government nationalized the health-care system and reduced doctors’ compensation. Is this a form of post-investment hold-up?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Agile Delivery

  AGILE DELIVERY

Assignment: 

The purpose of this assignment is to create features, user stories, enabler stories, and a team backlog for an agile IT project.

Part 1

For this assignment, read the “Running Case” in Chapters 4 and 5 of the textbook. Complete the following tasks.

1.     Using the “BIT-415 Features and Benefits Matrix” template, create a list of 10 features based upon the requirements found in the “Running Case.” Discuss the associated benefit hypothesis and acceptance criteria for each of the features. An example is provided in the template.

2.     Using the “BIT-415 User Story and Acceptance Criteria” template, create a list of three user stories for each of the features developed in Step 1. Discuss the appropriate acceptance criteria for each of the user stories. An example is provided in the template.

3.     Using the “BIT-415 Enabler Stories” template, create a list of enabler stories based upon the features defined in Step 1. Discuss the appropriate acceptance criteria for each of the enabler stories. An example is provided in the template.

Part 2

Using the “BIT-415 Team Backlog” template, create a team backlog using the features, user stories, and enabler stories developed in Part 1. Complete the template by adding the estimated duration and priority for each user story. An example is provided in the template.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

5.4 | Lab | Transport Protocols

In this lab, you will analyze packet capture (pcap) files (SNMP_Sample.cap and HTTP_Sample.cap) using the Wireshark network analysis tool in order to better understand the workings of UDP and TCP, the Transport Layer protocols. Download the attached instructions and pcap files for this exercise. When you have completed the lab, click on the assignment link to submit your finished work.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now