CSEC 630 iTrust Case Study

$18.99
CSEC 630 iTrust Case Study (UMUC)

CSEC 630 iTrust Case Study

Table of Contents

 

1.    Introduction. 3

2.    Why Protect Medical Health Information –Analysis. 4

2.1 Data Integrity. 5

2.2 Internal Threats5

2.3 External Threats6

2.4 Right Access, Anyone?7

2.5 When Security is not Baked In -SDLC. 9

3.    Security Measures. 9

3.1 Requirement for Adding Emergency Responders – Security Measures10

3.2 Requirement for Finding Qualified Licensed Health Care Provider – Security Measures12

3.3 Requirement for Viewing Access Logs – Security Measures14

3.4 Requirement for Updating Diagnoses Code Table – Security Measures15

4.    Recommendations. 16

4.1 Secure Database Web Application Recommendation. 16

4.2 Network Defense in Depth Recommendations18

4.3 Database Encryption & Cryptography Recommendations18

4.4 Role-Based Access Control Recommendations19

4.5 Two-Factor Authentication Recommendations20

4.6 Maintenance & Patch Management Recommendations21

5.    Lessons Learned & Conclusion. 22

References. 24

Appendix A. 28