Provide vendors with an overview of your fictitious health organization
Identify which departments or individuals will use the Security Concerns Common to All RDBMS, and for what purposes
Include the types of data that may be stored in the system and the importance of keeping these data secure
Explain the attributes of the database and describe the environment in which it will operate
Provide Context for the Work
Describe the security concepts and concerns for databases
Identify at least three security assurance and security functional requirements for the database that contains information for medical personnel and emergency responders
Provide Vendor Security Standards
Provide a set of internationally recognized standards that competing vendors will incorporate into the database
Address the concepts and issues with respect to disasters and disaster recovery, mission continuity, threats, and cyberattacks
Describe Defense Models
Define the use of defense models
Provide requirements in the RFP for the vendor to state its overall strategy for defensive principles
Explain the importance of understanding these principles
Explain how enclave computing relates to defensive principles.
Define enclave computing boundary defense, include enclave firewalls to separate databases and networks.
Define the different environments you expect the databases to be working in and the security policies applicable
Explore Database Defensive Methods
Include information about threats, risks, and possible recommendation strategies for these threats.
Provide a Requirement Statement for System Structure
State requirement statements for a web interface to do the following, all in the context of the medical database
a) Allow patients and other healthcare providers to view, modify, and update the database.
b) Allow integrated access across multiple systems.
c) Prevent data exfiltration through external media.
Provide Operating System Security Components
Provide requirements for segmentation by operating system rings to ensure processes do not affect each other
Provide one example of a process that could violate the segmentation mechanism. Ensure your requirement statements prevent such a violation from occurring.
Specify requirement statements that include a trusted platform module (TPM), in which a cryptographic key is supplied at the chip level. Include the specifications below
Describe the expected security gain from incorporating TPM.
Provide requirement statements that adhere to the trusted computing base (TCB) standard.
Provide examples of components to consider in the TCB.
Provide requirements of how to ensure the protection of these components, such as authentication procedures and malware protection.
Write Requirements for Multiple Independent Levels of Security
Write requirement statements for MILS for your database in the RFP.
Include the definitions and stipulations for cybersecurity models, including the Biba Integrity Model, Bell-LaPadula Model, and the Chinese Wall Model.
Indicate any limitations for the application of these models.
Include requirement statements for addressing insecure handling of data.
Include Access Control Concepts, and Capabilities
Include requirement statements in the RFP that the vendor must identify, the types of access control capabilities, and how they execute access control.
Provide requirement statements for the vendor regarding access control concepts, authentication, and direct object access.
Include Test Plan Requirements
Incorporate a short paragraph requiring the vendor to propose a test plan
Provide requirements for the vendor to supply an approximate timeline for the delivery of technology.
As the best, my homework help website in the world, Writersabc.com strives to deliver only high-quality finished papers to all customers. We value impeccable quality and guarantee that we will deliver on that promise more than anything else. We will deliver!
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.
Have you received your finished paper but are not satisfied with what our writer submitted? You can initiate our money-back guarantee to get your money back with no strings attached.Read more
Writersabc.com is the best my homework help website in the world. At WritersABC, we have a team of certified, tried, and tested writers who work around the clock to ensure that you receive only high-quality, 100% original finished papers.Read more
At WritersABC, we guarantee all our customers of the best essay writing service in the writing industry. And that’s precisely what we strive to deliver. As such, we encourage all our customers to utilize our unlimited free-revision policy if you aren’t satisfied with your paper. Don’t accept any paper until you are 100% satisfied with it.Read more
We value the trust that our clients accord us and respect every customers’ rights to personal data protection. We will never share, sell, or rent any information that we collect from you with any third parties. Both your personal and financial information is safe with us.Read more
We have only gotten this far with the help of our loyal customers and a team of dedicated experts. As the best, my homework help website, WritersABC implores customers to help make our writers’ work easier. Visit our fair-cooperation guarantee for more information on the same.Read more