Description
Add the following comments to the top of the code:
·Name
·Class and section (CS 166 02)
·Exercise Assignment (Chapter 10 Exercise)
·Due Date (see above)
·Description of the program
Unformatted Attachment Preview
CS 166 02
Exercise Assignment Chapter 10
5 Points
Name _______________________________
Due:
Tuesday, November 20, 2018
Complete Exercise 10-1 on page 271. The folder Chapter 10 Exercise is located in the I:\kopp\outbox\CS
166 02\Exercise Assignments folder. Use this folder for the assignment.
Add the following comments to the top of the code:
• Name
• Class and section (CS 166 02)
• Exercise Assignment (Chapter 10 Exercise)
• Due Date (see above)
• Description of the program
In order to receive credit, complete the following:
• Print the source code for all code
• Attach this sheet to the front of the source code with your name written in the appropriate
place
• Copy the folder mentioned above for this assignment to your folder in the I:\kopp\inbox\CS 166
02 folder.
Chapter 10
How to work with arrays
271
Exercise 10-1
Use a one-dimensional array
In this exercise, you can get some practice using one-dimensional arrays.
1. Import the project named ch10_exl_Array Test in the ex_starts directory.
Then, open the Main class.
2. Create a one-dimensional array of 99 double values. Then, use a for loop to
add a random number from 0 to 100 to each element in the array. To do that,
you can call the random method of the Math class and multiply it by 100 like
this:
Math.random() * 100
3. Use an enhanced for loop to sum the values in the array. Then, calculate the
average value and print that value to the console like this:
Average :
50.9526671843517
4. Use the sort method of the Arrays class to sort the values in the array,
and
print the median value (the 50th value) to the console like this:
Median:
52.18369291650803
5. Print the 9th value of the array to the console and every 9th value after that like
this:
Position: 9 8.927702403161032
Position: 18 14.053128749806076
...
Position: 99
22.471670293184822
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Really useful study material!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
C++: Hash Tables and Chaining
Before completing code assignment, make flowchart or psuedocode. Modify the provided HashTable.cpp file to implement a has ...
C++: Hash Tables and Chaining
Before completing code assignment, make flowchart or psuedocode. Modify the provided HashTable.cpp file to implement a hash table with a hashing algorithm using the chaining technique to handle collisions. Use the provided eBid_Monthly_Sales_Dec_2016 comma-separated values (CSV) data file for input. Complete the feature by prompting for an Auction ID and then displaying the requested item. Run Program in Eclipse IDE for C++. Specific requirements are in the word document attached. Please read through it. All lab files that are needed are zip file.
7 pages
Np Ex16 Cs1 4a Salehalmutairi 2
Note: Do not edit this sheet. If your name does not appear in cell B6, please download a new copy of the file from t
Np Ex16 Cs1 4a Salehalmutairi 2
Note: Do not edit this sheet. If your name does not appear in cell B6, please download a new copy of the file from t
UP Wk 2 Requirements for an IS in Organizations Operation Network Economy DIscussion
Wk 2: Part IIn light of the following comments, discuss the questions listed below:The term “network economy” is used ...
UP Wk 2 Requirements for an IS in Organizations Operation Network Economy DIscussion
Wk 2: Part IIn light of the following comments, discuss the questions listed below:The term “network economy” is used to emphasize the features of the new, technology-enhanced economy within the information society. It stems from a key attribute— products and services that are created through networks operating on large or global scales, enabled by the current status of the global networks.What are the principal impacts of the network economy for both established organizations and upstarts? Identify and provide examples of the most important recent technology and business innovations in the network economy. How has the adaptation of the new technologies affected the organizations from your examples?The network economy introduces information-intensive goods, such as downloadable music and software. Information, as an economic entity, differs in behavior compared to traditional goods. How do information-intensive goods differ from traditional information goods? Provide two examples of each. What is the principal economic characteristic of information? What are the principal implications for strategic decisions?What are the principal enablers for the continued importance of e-commerce trends? What does the term e-commerce 2.0 refer to? What are main principles of e-commerce 2.0? Give real-life examples of e-commerce 2.0 principles. Do you think that your set of e-commerce 2.0 principles is comprehensive? Why? Are these principles congruent with your personal understanding of e-commerce?IS RequirementsTo be able to recommend the "dream version" of an integrated IS for your organization, which would manage all aspects of business operations and decision making, you need to first finalize the requirements. This week, as part of the final project, conduct research to obtain the requirements for an IS for your organization’s operation. In addition, research any standards and regulations that need to be followed from professional organizations, industry organizations, or government.On the basis of your analysis, create a report that provides a blueprint of an ideal IS that you would like to implement for your organization.Submission Details:Submit your plan in a 5–7 pages in a Microsoft Word document, using APA style.
CST 620 CUMS Hospital Database Management Security Paper
Database Security AssessmentYou are a contracting officer's technical representative, a security system engineer at a mili ...
CST 620 CUMS Hospital Database Management Security Paper
Database Security AssessmentYou are a contracting officer's technical representative, a security system engineer at a military hospital. Your department's leaders are adopting a new medical health care database management system. And they've tasked you to create a request for a proposal for which different vendors will compete to build and provide to the hospital.A request for proposal, or RFP, is when an organization requests estimates on performing a function, delivering a technology, providing a service, or augmenting staff. RFPs are tailored to each endeavor but have common components and are important in the world of IT contracting and procurement, and acquisitions.To complete the RFP, you must determine the technical and security specifications for the system. You'll write the requirements for the overall system and also provide evaluation standards that will be used in rating the vendor's performance. Your learning will help you determine your system's requirements.As you discover methods of attack, you'll write prevention and remediation requirements for the vendor to perform. You must identify the different vulnerabilities the database should be hardened against.Modern health care systems incorporate databases for effective and efficient management of patient health care. Databases are vulnerable to cyberattacks and must be designed and built with security controls from the beginning of the life cycle.Although hardening the database early in the life cycle is better, security is often incorporated after deployment, forcing hospital and health care IT, professionals to play catch-up. Database security requirements should be defined at the requirements stage of acquisition and procurement.System security engineers and other acquisition personnel can effectively assist vendors in building better health care database systems by specifying security requirements upfront within the request for proposal (RFP). In this project, you will be developing an RFP for a new medical health care database management system.Parts of your deliverables will be developed through your learning lab. You will submit the following deliverables for this project:DeliverablesAn RFP, about 10 to 12 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report.An MS-Excel spreadsheet with lab results.There are 11 steps in this project. You will begin with the workplace scenario and continue with Step 1: "Provide an Overview for Vendors."CompetenciesYour work will be evaluated using the competencies listed below.1.1: Organize a document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer's ideas.1.8: Create clear oral messages.2.1: Identity and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.2.5: Develop well-reasoned ideas, conclusions, or decisions, checking them against relevant criteria and benchmarks.4.2: Demonstrate the ability to plan and execute a project, articulating clear objectives and goals for the team.9.4: Manages and supports the acquisition life cycle, including planning, determining specifications, selecting, and procuring information and communications technology (ICT) and cybersecurity products used in the organization's design, development, and maintenance of its infrastructure to minimize potential risks and vulnerabilities.Step 1: Provide an Overview for VendorsAs the contracting officer's technical representative (COTR), you are the liaison between your hospital and potential vendors. It is your duty to provide vendors with an overview of your organization. To do so, identify information about your hospital. Conduct independent research on hospital database management. Think about the hospital's different organizational needs. What departments or individuals will use the Security Concerns Common to All RDBMSs, and for what purposes?Provide an overview of the types of data that may be stored in the system and the importance of keeping these data secure. Include this information in the RFP.After the overview is complete, move to the next step to provide context for the vendors with an overview of needs.Step 2: Provide Context for the WorkNow that you have provided vendors with an overview of your hospital's needs, you will provide the vendors with a context for the work needed.Since you are familiar with the application and implementation, give guidance to the vendors by explaining the attributes of the database and by describing the environment in which it will operate. Details are important in order for the vendors to provide optimal services.It is important to understand the vulnerability of a relational database management system (RDBMS). Read the following resources about RDBMSs.error handling and information leakageinsecure handlingcross-site scripting (XSS/CSRF) flawsSQL injectionsinsecure configuration managementauthentication (with a focus on broken authentication)access control (with a focus on broken access control)Describe the security concepts and concerns for databases.Identify at least three security assurance and security functional requirements for the database that contains information for medical personnel and emergency responders.Include this information in the RFP.In the next step, you will provide security standards for the vendors.Step 3: Provide Vendor Security StandardsIn the previous step, you added context for the needed work. Now, provide a set of internationally recognized standards that competing vendors will incorporate into the database. These standards will also serve as a checklist to measure security performance and security processes.Read the following resources to prepare:database modelsCommon Criteria (CC) for information technology security evaluationevaluated assurance levels (EALs)continuity of serviceAddress the concepts and issues with respect to disasters and disaster recovery, mission continuity, threats, and cyberattacks.Include these security standards in the RFP.In the next step, you will describe defense models for the RFP.Step 4: Describe Defense ModelsNow that you have established security standards for the RFP, you will define the use of defense models. This information is important since the networking environment will have numerous users with different levels of access.Provide requirements in the RFP for the vendor to state its overall strategy for defensive principles. Explain the importance of understanding these principles. To further your understanding, click the link and read about defensive principles.Read these resources on enclave computing environment:enclave/computing environmentcyber operations in DoD policy and plansExplain how enclave computing relates to defensive principles. The network domains should be at different security levels, have different levels of access, and different read and write permissions. Define enclave computing boundary defense.Include enclave firewalls to separate databases and networks.Define the different environments you expect the databases to be working in and the security policies applicable.Provide this information in the RFPStep 6: Provide a Requirement Statement for System StructureIn the previous step, you identified defense requirements for the vendor. In this step of the RFP, you will focus on the structure of the system.Provide requirement statements for a web interface to:Allow patients and other health care providers to view, modify, and update the database.Allow integrated access across multiple systems.Prevent data exfiltration through external media.State these requirements in the context of the medical database. Include this information in the RFP.In the next step, you will outline operating system security components.Step 7: Provide Operating System Security ComponentsIn the previous step, you composed requirement statements regarding the system setup. In this step, you will provide the operating system security components that will support the database and the security protection mechanisms.Read these resources on operating system security. Then:Provide requirements for segmentation by operating system rings to ensure processes do not affect each other.Provide one example of a process that could violate the segmentation mechanism. Ensure your requirement statements prevent such a violation from occurring.Specify requirement statements that include a trusted platform module (TPM), in which a cryptographic key is supplied at the chip level. In those specifications:Describe the expected security gain from incorporating TPM.Provide requirement statements that adhere to the trusted computing base (TCB) standard.Provide examples of components to consider in the TCB.Provide requirements of how to ensure protection of these components, such as authentication procedures and malware protection.Read the following resources to familiarize yourself with these concepts:trusted computingtrusted computing baseInclude this information in the RFP.In the following step, you will write requirements for levels of security.Step 8: Write Requirements for Multiple Independent Levels of SecurityThe previous step required you to identify operating system security components to support the database. For this step, you will focus on identification, authentication, and access. Access to the data is accomplished using security concepts and security models that ensure confidentiality and integrity of the data. Refer to access control and authentication to refresh your knowledge.The healthcare database should be able to incorporate multiple independent levels of security (MILS) because the organization plans to expand the number of users.Write requirement statements for MILS for your database in the RFP.Include the definitions and stipulations for cybersecurity models, including the Biba Integrity Model, Bell-LaPadula Model, and the Chinese Wall Model.Indicate any limitations for the application of these models.Read the following resources and note which cybersecurity models are most beneficial to your database:multiple independent levels of security (MILS)cybersecurity modelsinsecure handlingInclude requirement statements for addressing insecure handling of data.Include this information in your RFP.In the next step, you will consider access control.Step 9: Include Access Control Concepts, CapabilitiesIn the previous step, you wrote requirements for multiple levels of security, including the topics of identification, authentication, and access. In this step, you will focus on access control. The vendor will need to demonstrate capabilities to enforce identification, authentication, access, and authorization to the database management systems.Include requirement statements in the RFP that the vendor must identify, the types of access control capabilities, and how they execute access control.Provide requirement statements for the vendor regarding access control concepts, authentication, and direct object access.Include the requirement statements in the RFP.In the next step, you will incorporate additional security requirements and request vendors to provide a test plan.Step 10: Include Test Plan RequirementsIn the previous step, you defined access control requirements. Here, you will define test plan requirements for vendors.Incorporate a short paragraph requiring the vendor to propose a test plan after reviewing these guidelines for a test and remediation results (TPRR) report.Provide requirements for the vendor to supply an approximate timeline for the delivery of technology. Step 11: Compile the RFP DocumentIn this final step, you will compile the RFP for a secure health care database management system. Review the document to make sure nothing is missed before submission. Submit the following deliverables to your assignment folder.DeliverablesAn RFP, about 10 to 12 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report.An MS-Excel spreadsheet with lab results.Check Your Evaluation CriteriaBefore you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer's ideas.1.8: Create clear oral messages.2.1: Identify and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.4.2: Demonstrate the ability to plan and execute a project, articulating clear objectives and goals for the team.9.4: Manages and supports the acquisition life cycle, including planning, determining specifications, selecting, and procuring information and communications technology (ICT) and cybersecurity products used in the organization's design, development, and maintenance of its infrastructure to minimize potential risks and vulnerabilities.
5 pages
Microsoft Access 2016 Project Instructions 2
This project will have you create a database that tracks employment information for students who have graduated and the co ...
Microsoft Access 2016 Project Instructions 2
This project will have you create a database that tracks employment information for students who have graduated and the companies they are employed ...
Similar Content
Writing Resume
I need help writing my resume. I have tried countless websites and I have yet been called out for my short and vague resum...
NYIT Information and Management Questions
1. Provide an annotated bibliography of one article each on 1. Information and Management and 2.Journal of Database Manage...
IS355 Grantham University Risk Management in an IT environment
Hello, I need help with my lab assignment. I've attached the info.Identifying Risks The task of identifying risks in an ...
New England College Situation of Customer Service at Datatronic Case Study
Datatronics Case Study- Read the Customer Service at Datatronics Case Study on pages 246-250 in the textbook. Answer the ...
IA 610 Ethical, Legal, and Policy issues in cyber security
OverviewThis course provides an introduction to major ethical, legal, and policy issues in the cyberthreat landscape, as w...
Ashford University Digital Forensics in Criminal Investigation Essay
Do a bit of research on-line. Find a criminal case that involved Digital Forensics. Using WORD, write an ORIGINAL brief es...
Main
A use case is a type of diagram that shows a structure and architecture of a system, and how each factor correlates to ano...
Cybersecurity Posture
An organization’s cybersecurity level especially relates to its full cybersecurity ability. It represents the linked saf...
Computer Science Paper B2
The Workplace Privacy Law is a policy regulation that seeks to protect an employee`s right to privacy in their place of wo...
Related Tags
Book Guides
The BFG
by Roald Dahl
Enders Game
by E. M. Forster
The Adventures of Huckleberry Finn
by Mark Twain
Principles - Life and Work
by Ray Dalio
Normal People
by Sally Rooney
A Brief History of Humankind Sapiens
by Yuval Noah Harari
Divergent
by Veronica Roth
The Da Vinci Code
by Dan Brown
Ethan Frome
by Edith Wharton
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
C++: Hash Tables and Chaining
Before completing code assignment, make flowchart or psuedocode. Modify the provided HashTable.cpp file to implement a has ...
C++: Hash Tables and Chaining
Before completing code assignment, make flowchart or psuedocode. Modify the provided HashTable.cpp file to implement a hash table with a hashing algorithm using the chaining technique to handle collisions. Use the provided eBid_Monthly_Sales_Dec_2016 comma-separated values (CSV) data file for input. Complete the feature by prompting for an Auction ID and then displaying the requested item. Run Program in Eclipse IDE for C++. Specific requirements are in the word document attached. Please read through it. All lab files that are needed are zip file.
7 pages
Np Ex16 Cs1 4a Salehalmutairi 2
Note: Do not edit this sheet. If your name does not appear in cell B6, please download a new copy of the file from t
Np Ex16 Cs1 4a Salehalmutairi 2
Note: Do not edit this sheet. If your name does not appear in cell B6, please download a new copy of the file from t
UP Wk 2 Requirements for an IS in Organizations Operation Network Economy DIscussion
Wk 2: Part IIn light of the following comments, discuss the questions listed below:The term “network economy” is used ...
UP Wk 2 Requirements for an IS in Organizations Operation Network Economy DIscussion
Wk 2: Part IIn light of the following comments, discuss the questions listed below:The term “network economy” is used to emphasize the features of the new, technology-enhanced economy within the information society. It stems from a key attribute— products and services that are created through networks operating on large or global scales, enabled by the current status of the global networks.What are the principal impacts of the network economy for both established organizations and upstarts? Identify and provide examples of the most important recent technology and business innovations in the network economy. How has the adaptation of the new technologies affected the organizations from your examples?The network economy introduces information-intensive goods, such as downloadable music and software. Information, as an economic entity, differs in behavior compared to traditional goods. How do information-intensive goods differ from traditional information goods? Provide two examples of each. What is the principal economic characteristic of information? What are the principal implications for strategic decisions?What are the principal enablers for the continued importance of e-commerce trends? What does the term e-commerce 2.0 refer to? What are main principles of e-commerce 2.0? Give real-life examples of e-commerce 2.0 principles. Do you think that your set of e-commerce 2.0 principles is comprehensive? Why? Are these principles congruent with your personal understanding of e-commerce?IS RequirementsTo be able to recommend the "dream version" of an integrated IS for your organization, which would manage all aspects of business operations and decision making, you need to first finalize the requirements. This week, as part of the final project, conduct research to obtain the requirements for an IS for your organization’s operation. In addition, research any standards and regulations that need to be followed from professional organizations, industry organizations, or government.On the basis of your analysis, create a report that provides a blueprint of an ideal IS that you would like to implement for your organization.Submission Details:Submit your plan in a 5–7 pages in a Microsoft Word document, using APA style.
CST 620 CUMS Hospital Database Management Security Paper
Database Security AssessmentYou are a contracting officer's technical representative, a security system engineer at a mili ...
CST 620 CUMS Hospital Database Management Security Paper
Database Security AssessmentYou are a contracting officer's technical representative, a security system engineer at a military hospital. Your department's leaders are adopting a new medical health care database management system. And they've tasked you to create a request for a proposal for which different vendors will compete to build and provide to the hospital.A request for proposal, or RFP, is when an organization requests estimates on performing a function, delivering a technology, providing a service, or augmenting staff. RFPs are tailored to each endeavor but have common components and are important in the world of IT contracting and procurement, and acquisitions.To complete the RFP, you must determine the technical and security specifications for the system. You'll write the requirements for the overall system and also provide evaluation standards that will be used in rating the vendor's performance. Your learning will help you determine your system's requirements.As you discover methods of attack, you'll write prevention and remediation requirements for the vendor to perform. You must identify the different vulnerabilities the database should be hardened against.Modern health care systems incorporate databases for effective and efficient management of patient health care. Databases are vulnerable to cyberattacks and must be designed and built with security controls from the beginning of the life cycle.Although hardening the database early in the life cycle is better, security is often incorporated after deployment, forcing hospital and health care IT, professionals to play catch-up. Database security requirements should be defined at the requirements stage of acquisition and procurement.System security engineers and other acquisition personnel can effectively assist vendors in building better health care database systems by specifying security requirements upfront within the request for proposal (RFP). In this project, you will be developing an RFP for a new medical health care database management system.Parts of your deliverables will be developed through your learning lab. You will submit the following deliverables for this project:DeliverablesAn RFP, about 10 to 12 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report.An MS-Excel spreadsheet with lab results.There are 11 steps in this project. You will begin with the workplace scenario and continue with Step 1: "Provide an Overview for Vendors."CompetenciesYour work will be evaluated using the competencies listed below.1.1: Organize a document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer's ideas.1.8: Create clear oral messages.2.1: Identity and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.2.5: Develop well-reasoned ideas, conclusions, or decisions, checking them against relevant criteria and benchmarks.4.2: Demonstrate the ability to plan and execute a project, articulating clear objectives and goals for the team.9.4: Manages and supports the acquisition life cycle, including planning, determining specifications, selecting, and procuring information and communications technology (ICT) and cybersecurity products used in the organization's design, development, and maintenance of its infrastructure to minimize potential risks and vulnerabilities.Step 1: Provide an Overview for VendorsAs the contracting officer's technical representative (COTR), you are the liaison between your hospital and potential vendors. It is your duty to provide vendors with an overview of your organization. To do so, identify information about your hospital. Conduct independent research on hospital database management. Think about the hospital's different organizational needs. What departments or individuals will use the Security Concerns Common to All RDBMSs, and for what purposes?Provide an overview of the types of data that may be stored in the system and the importance of keeping these data secure. Include this information in the RFP.After the overview is complete, move to the next step to provide context for the vendors with an overview of needs.Step 2: Provide Context for the WorkNow that you have provided vendors with an overview of your hospital's needs, you will provide the vendors with a context for the work needed.Since you are familiar with the application and implementation, give guidance to the vendors by explaining the attributes of the database and by describing the environment in which it will operate. Details are important in order for the vendors to provide optimal services.It is important to understand the vulnerability of a relational database management system (RDBMS). Read the following resources about RDBMSs.error handling and information leakageinsecure handlingcross-site scripting (XSS/CSRF) flawsSQL injectionsinsecure configuration managementauthentication (with a focus on broken authentication)access control (with a focus on broken access control)Describe the security concepts and concerns for databases.Identify at least three security assurance and security functional requirements for the database that contains information for medical personnel and emergency responders.Include this information in the RFP.In the next step, you will provide security standards for the vendors.Step 3: Provide Vendor Security StandardsIn the previous step, you added context for the needed work. Now, provide a set of internationally recognized standards that competing vendors will incorporate into the database. These standards will also serve as a checklist to measure security performance and security processes.Read the following resources to prepare:database modelsCommon Criteria (CC) for information technology security evaluationevaluated assurance levels (EALs)continuity of serviceAddress the concepts and issues with respect to disasters and disaster recovery, mission continuity, threats, and cyberattacks.Include these security standards in the RFP.In the next step, you will describe defense models for the RFP.Step 4: Describe Defense ModelsNow that you have established security standards for the RFP, you will define the use of defense models. This information is important since the networking environment will have numerous users with different levels of access.Provide requirements in the RFP for the vendor to state its overall strategy for defensive principles. Explain the importance of understanding these principles. To further your understanding, click the link and read about defensive principles.Read these resources on enclave computing environment:enclave/computing environmentcyber operations in DoD policy and plansExplain how enclave computing relates to defensive principles. The network domains should be at different security levels, have different levels of access, and different read and write permissions. Define enclave computing boundary defense.Include enclave firewalls to separate databases and networks.Define the different environments you expect the databases to be working in and the security policies applicable.Provide this information in the RFPStep 6: Provide a Requirement Statement for System StructureIn the previous step, you identified defense requirements for the vendor. In this step of the RFP, you will focus on the structure of the system.Provide requirement statements for a web interface to:Allow patients and other health care providers to view, modify, and update the database.Allow integrated access across multiple systems.Prevent data exfiltration through external media.State these requirements in the context of the medical database. Include this information in the RFP.In the next step, you will outline operating system security components.Step 7: Provide Operating System Security ComponentsIn the previous step, you composed requirement statements regarding the system setup. In this step, you will provide the operating system security components that will support the database and the security protection mechanisms.Read these resources on operating system security. Then:Provide requirements for segmentation by operating system rings to ensure processes do not affect each other.Provide one example of a process that could violate the segmentation mechanism. Ensure your requirement statements prevent such a violation from occurring.Specify requirement statements that include a trusted platform module (TPM), in which a cryptographic key is supplied at the chip level. In those specifications:Describe the expected security gain from incorporating TPM.Provide requirement statements that adhere to the trusted computing base (TCB) standard.Provide examples of components to consider in the TCB.Provide requirements of how to ensure protection of these components, such as authentication procedures and malware protection.Read the following resources to familiarize yourself with these concepts:trusted computingtrusted computing baseInclude this information in the RFP.In the following step, you will write requirements for levels of security.Step 8: Write Requirements for Multiple Independent Levels of SecurityThe previous step required you to identify operating system security components to support the database. For this step, you will focus on identification, authentication, and access. Access to the data is accomplished using security concepts and security models that ensure confidentiality and integrity of the data. Refer to access control and authentication to refresh your knowledge.The healthcare database should be able to incorporate multiple independent levels of security (MILS) because the organization plans to expand the number of users.Write requirement statements for MILS for your database in the RFP.Include the definitions and stipulations for cybersecurity models, including the Biba Integrity Model, Bell-LaPadula Model, and the Chinese Wall Model.Indicate any limitations for the application of these models.Read the following resources and note which cybersecurity models are most beneficial to your database:multiple independent levels of security (MILS)cybersecurity modelsinsecure handlingInclude requirement statements for addressing insecure handling of data.Include this information in your RFP.In the next step, you will consider access control.Step 9: Include Access Control Concepts, CapabilitiesIn the previous step, you wrote requirements for multiple levels of security, including the topics of identification, authentication, and access. In this step, you will focus on access control. The vendor will need to demonstrate capabilities to enforce identification, authentication, access, and authorization to the database management systems.Include requirement statements in the RFP that the vendor must identify, the types of access control capabilities, and how they execute access control.Provide requirement statements for the vendor regarding access control concepts, authentication, and direct object access.Include the requirement statements in the RFP.In the next step, you will incorporate additional security requirements and request vendors to provide a test plan.Step 10: Include Test Plan RequirementsIn the previous step, you defined access control requirements. Here, you will define test plan requirements for vendors.Incorporate a short paragraph requiring the vendor to propose a test plan after reviewing these guidelines for a test and remediation results (TPRR) report.Provide requirements for the vendor to supply an approximate timeline for the delivery of technology. Step 11: Compile the RFP DocumentIn this final step, you will compile the RFP for a secure health care database management system. Review the document to make sure nothing is missed before submission. Submit the following deliverables to your assignment folder.DeliverablesAn RFP, about 10 to 12 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report.An MS-Excel spreadsheet with lab results.Check Your Evaluation CriteriaBefore you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer's ideas.1.8: Create clear oral messages.2.1: Identify and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.4.2: Demonstrate the ability to plan and execute a project, articulating clear objectives and goals for the team.9.4: Manages and supports the acquisition life cycle, including planning, determining specifications, selecting, and procuring information and communications technology (ICT) and cybersecurity products used in the organization's design, development, and maintenance of its infrastructure to minimize potential risks and vulnerabilities.
5 pages
Microsoft Access 2016 Project Instructions 2
This project will have you create a database that tracks employment information for students who have graduated and the co ...
Microsoft Access 2016 Project Instructions 2
This project will have you create a database that tracks employment information for students who have graduated and the companies they are employed ...
Earn money selling
your Study Documents