Write Requirements for Multiple Independent Levels of Security and Include Access Control Concepts and Capabilities

I have to Write Requirements for Multiple Independent Levels of Security and Include Access Control Concepts, Capabilities. See Attached Files
project_5.docx

project_5_scenerio.docx

Don't use plagiarized sources. Get Your Custom Essay on
Write Requirements for Multiple Independent Levels of Security and Include Access Control Concepts and Capabilities
Just from $13/Page
Order Essay

project_5.pdf

project_5_scenerio.pdf

Unformatted Attachment Preview

This assignment is two tasks of a general project and should be about four to six pages total.
Please review the attached scenario of the project and also step eight and nine descriptions.
MILS REQUIREMENTS
[Integrate information from step 8. Write requirements for multiple independent levels of
security (MILS). Include that vendor will be devising prototyping test plans and executing tests
against sample databases to determine requirements for access, access control, authentication and
security models that define read and write access. Also access to data will be accomplished using
security concepts and security models that ensure confidentiality and integrity of data. Best to
review access control and authentication. Health care database should have capabilities for
MILS. Lastly, include organization plans on expanding user base of the database, web interface,
database read, and write and access controls should be built incorporating security models.
Before writing the requirement statement review MILS, cybersecurity models and insecure
handling. Include in the statement: 1) definitions and stipulations for cybersecurity models; 2)
the Biba Integrity, Bell-LaPaula, Chinese Wall Models and any limitations for the application of
these models. Include requirement statements regarding vendor’s insecure handling solutions
based on the definitions of the security model included in requirements statement.]
Step 8: Write Requirements for Multiple Independent Levels of Security
The previous step required you to identify operating system security components to support the
database. For this step, you will focus on identification, authentication, and access. Since you are
determining and incorporating the requirements into the RFP, in your role as SSE, you are also
devising prototyping test plans and executing tests against sample databases to determine the
requirements for access, access control, identification and authentication, and the security models
that define read and write access. Access to the data is accomplished using security concepts and
security models that ensure confidentiality and integrity of the data. Refer to access control and
authentication to refresh your knowledge.
The health care database should have capabilities for multiple independent levels of security
(MILS). Your organization plans on expanding the user base of the database, and the web
interface and the database read, write, and access controls should be built incorporating security
models.
To be completed by a designated team member:
Write requirement statements for MILS in your database. Include the definitions and stipulations
for cybersecurity models, including the Biba Integrity Model, Bell-LaPadula model and and the
Chinese Wall model. Indicate any limitations for the application of these models. Review the
content of the following resources. As you’re reading, note which cybersecurity models are most
beneficial to your database.
•
•
•
multiple independent levels of security (MILS)
cybersecurity models
insecure handling
Include requirement statements regarding the vendor’s insecure handling solutions. They are to
be accounted for in whatever security model the vendor chooses to incorporate, based on the
definitions of the security model that you included with the requirements statement. Include this
in the RFP.
In the next step, you will consider access control.
ACCESS CONTROL REQUIREMENTS
[Integrate information from step 9. Include access control concepts, capabilities. Focus on access
control. Vendor will need to demonstrate capabilities to enforce to database management
systems that includes identification, authentication, access, and authorization. The vendor must
identify types of access control capabilities and how they execute access control. Provide
requirement statements for vendor regarding access control concepts, authentication, and direct
object access.]
Step 9: Include Access Control Concepts, Capabilities
In the previous step, you wrote requirements for multiple levels of security, including the topics
of identification, authentication, and access. In this step, you will focus on access control. The
vendor will need to demonstrate capabilities to enforce identification, authentication, access, and
authorization to the database management systems. Include requirement statements in the RFP
that the vendor must identify, the types of access control capabilities, and how they execute
access control.
To be completed by a designated team member:
Provide requirements statements for the vendor regarding access control concepts,
authentication, and direct object access. Include the requirement statement in the RFP.
In the next step, you will create a test plan and review your remediation efforts, as well as come
up with a report for vendors.
CST620_Project 5: Database Security Assessment
(Group Project Case Study)
You are a contracting officer’s technical representative, a Security System Engineer, SSE, at a
military hospital. Your department’s leaders are adopting a new medical health care database
management system. And they’ve tasked you to put together a team to create a request for proposal
for which different vendors will compete to build and provide to the hospital.
A Request For Proposal, or RFP, is when an organization sends out a request for estimates on
performing a function, delivering a technology, or providing a service or augmenting staff. RFPs are
tailored to each endeavor but have common components and are important in the world of IT
contracting and for procurement and acquisitions. To complete the RFP, you must determine the
technical and security specifications for the system.
You’ll write the requirements for the overall system and also provide evaluation standards that will
be used in rating the vendor’s performance. Your learning will help you determine your system’s
requirements. As you discover methods of attack, you’ll write prevention and remediation
requirements for the vendor to perform.
Additionally, you’ll produce a report detailing a test plan and remediation results. This document will
accompany the RFP and will include security guidelines for vendors. You must identify the different
vulnerabilities the database should be hardened against.
You have a good relationship with the vendors in determining these requirements for the
procurement. You’ll work in partnership in your teams to define test protocol of the database
management system and to devise remediation. These results will be incorporated into the test
plan and remediation results and will also be part of the RFP. Work in partnership teams to test and
validate the remediation and attacks and to create the RFP.
This assignment is two tasks of a general project and should be about four to six pages total.
Please review the attached scenario of the project and also step eight and nine descriptions.
MILS REQUIREMENTS
[Integrate information from step 8. Write requirements for multiple independent levels of
security (MILS). Include that vendor will be devising prototyping test plans and executing tests
against sample databases to determine requirements for access, access control, authentication and
security models that define read and write access. Also access to data will be accomplished using
security concepts and security models that ensure confidentiality and integrity of data. Best to
review access control and authentication. Health care database should have capabilities for
MILS. Lastly, include organization plans on expanding user base of the database, web interface,
database read, and write and access controls should be built incorporating security models.
Before writing the requirement statement review MILS, cybersecurity models and insecure
handling. Include in the statement: 1) definitions and stipulations for cybersecurity models; 2)
the Biba Integrity, Bell-LaPaula, Chinese Wall Models and any limitations for the application of
these models. Include requirement statements regarding vendor’s insecure handling solutions
based on the definitions of the security model included in requirements statement.]
Step 8: Write Requirements for Multiple Independent Levels of Security
The previous step required you to identify operating system security components to support the
database. For this step, you will focus on identification, authentication, and access. Since you are
determining and incorporating the requirements into the RFP, in your role as SSE, you are also
devising prototyping test plans and executing tests against sample databases to determine the
requirements for access, access control, identification and authentication, and the security models
that define read and write access. Access to the data is accomplished using security concepts and
security models that ensure confidentiality and integrity of the data. Refer to access control and
authentication to refresh your knowledge.
The health care database should have capabilities for multiple independent levels of security
(MILS). Your organization plans on expanding the user base of the database, and the web
interface and the database read, write, and access controls should be built incorporating security
models.
To be completed by a designated team member:
Write requirement statements for MILS in your database. Include the definitions and stipulations
for cybersecurity models, including the Biba Integrity Model, Bell-LaPadula model and and the
Chinese Wall model. Indicate any limitations for the application of these models. Review the
content of the following resources. As you’re reading, note which cybersecurity models are most
beneficial to your database.
•
•
•
multiple independent levels of security (MILS)
cybersecurity models
insecure handling
Include requirement statements regarding the vendor’s insecure handling solutions. They are to
be accounted for in whatever security model the vendor chooses to incorporate, based on the
definitions of the security model that you included with the requirements statement. Include this
in the RFP.
In the next step, you will consider access control.
ACCESS CONTROL REQUIREMENTS
[Integrate information from step 9. Include access control concepts, capabilities. Focus on access
control. Vendor will need to demonstrate capabilities to enforce to database management
systems that includes identification, authentication, access, and authorization. The vendor must
identify types of access control capabilities and how they execute access control. Provide
requirement statements for vendor regarding access control concepts, authentication, and direct
object access.]
Step 9: Include Access Control Concepts, Capabilities
In the previous step, you wrote requirements for multiple levels of security, including the topics
of identification, authentication, and access. In this step, you will focus on access control. The
vendor will need to demonstrate capabilities to enforce identification, authentication, access, and
authorization to the database management systems. Include requirement statements in the RFP
that the vendor must identify, the types of access control capabilities, and how they execute
access control.
To be completed by a designated team member:
Provide requirements statements for the vendor regarding access control concepts,
authentication, and direct object access. Include the requirement statement in the RFP.
In the next step, you will create a test plan and review your remediation efforts, as well as come
up with a report for vendors.
CST620_Project 5: Database Security Assessment
(Group Project Case Study)
You are a contracting officer’s technical representative, a Security System Engineer, SSE, at a
military hospital. Your department’s leaders are adopting a new medical health care database
management system. And they’ve tasked you to put together a team to create a request for proposal
for which different vendors will compete to build and provide to the hospital.
A Request For Proposal, or RFP, is when an organization sends out a request for estimates on
performing a function, delivering a technology, or providing a service or augmenting staff. RFPs are
tailored to each endeavor but have common components and are important in the world of IT
contracting and for procurement and acquisitions. To complete the RFP, you must determine the
technical and security specifications for the system.
You’ll write the requirements for the overall system and also provide evaluation standards that will
be used in rating the vendor’s performance. Your learning will help you determine your system’s
requirements. As you discover methods of attack, you’ll write prevention and remediation
requirements for the vendor to perform.
Additionally, you’ll produce a report detailing a test plan and remediation results. This document will
accompany the RFP and will include security guidelines for vendors. You must identify the different
vulnerabilities the database should be hardened against.
You have a good relationship with the vendors in determining these requirements for the
procurement. You’ll work in partnership in your teams to define test protocol of the database
management system and to devise remediation. These results will be incorporated into the test
plan and remediation results and will also be part of the RFP. Work in partnership teams to test and
validate the remediation and attacks and to create the RFP.

Purchase answer to see full
attachment

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency

Order your essay today and save 15% with the discount code ESSAYHELP