0% found this document useful (0 votes)
20 views3 pages

Database Security

Role-based access control would be implemented to ensure patient data privacy in the healthcare management system. Doctors would have read and write access to patient files to access history and enter diagnoses, while pharmacy clerks would have only read access to determine prescribed drugs. Attribute-based access control could also be used, only granting access to patient records from terminals within the organization's building.

Uploaded by

Love
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views3 pages

Database Security

Role-based access control would be implemented to ensure patient data privacy in the healthcare management system. Doctors would have read and write access to patient files to access history and enter diagnoses, while pharmacy clerks would have only read access to determine prescribed drugs. Attribute-based access control could also be used, only granting access to patient records from terminals within the organization's building.

Uploaded by

Love
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Q1: IMAGINE YOU ARE RESPONSIBLE FOR DESIGNING THE DATABASE SECURITY OF A HEALTHCARE

MANAGEMENT SYSTEM. EXPLAIN THE ACCESS CONTROL MECHANISMS YOU WOULD IMPLEMENT
TO ENSURE PATIENT DATA PRIVACY. DISCUSS SPECIFIC ROLES, PERMISSIONS AND SCENARIOS.

When designing a designing an information system access control can defined based off of four
possible mechanisms namely: Role-based, Mandatory, Attribute-based and Discretionary. These
mechanisms differ in the aspects used in their criteria for granting or revoking rights and privileges
to different users of this information system.

Role-based access control uses the user’s job and function in the organisation as this criteria. For
instance in a hospital scenario a doctor and a pharmacy clerk would typically be granted different
levels of access because their roles in the organisation have different requirements. The clerk would
only need read only access to patient files determine the necessary drugs prescribed whilst a doctor
need to read and write to these files to access history and write in his new diagnoses. It is however
up to the system designers, analysts and administrators’ tasks to determine the access levels
according to each users specific roles. Also requires continuous administrative oversight to change
adjust the rights of each users depending on shifts in the organisational roles.

Attribute based considers the attributes of users, data, action and environment to define policies
and rules for access. For instance patient record could only be granted from a user terminal in the
organisational building. This access control makes use of the environment of attribute of the users
attempting to access this data.

Mandatory access control enforces a strict hierarchy of security levels for data and users. Data and
users are classified and assigned security labels such as top secret, secret, confidential, restricted or
unclassified. Users can then only access information that has been classified with equal or lower
security labels than their own. This hierarchy has to be defined during the systems implementation
phase by system designers and all those involved during this phase.

Lastly, discretionary access control is a mechanism that allows users of the system to determine who
can access their data; in other words, the can share information at their own discretion without the
system administrator’s interference.

Q2: ANALYSE THE SECURITY IMPLICATIONS OF USING SYMMETRIC ENCRYPTION VERSUS


ASYMMETRIC ENCRYPTION FOR PROTECTING SENSITIVE DATA IN A FINANCIAL INSTITUTION’S
DATABASE. CONSIDER ASPECTS SUCH AS KEY MANAGEMENT AND COMPUTATIONAL OVERHEAD.

Symmetric key encryption describes a cryptographic system that makes use of one key for both the
encryption and decryption process. By making use of some encryption algorithm, information can be
kept secure from adversaries; and when the intended user wishes to access this information, they
are able to do so by using this secret key in a decryption algorithm. Symmetric-key encryption
methods have the fastest implementations among all encryption techniques, making them ideal for
encrypting huge volumes of data. This encryption technique, however, raises the challenge of, ‘how
can parties share this secret key without it being intercepted by unauthorised entities?’ Because
there is a risk that the key could be exposed, leaving your data at risk of being decrypted by an
adversary, when sharing this key between intended parties. Due to this factor symmetric key
encryption is ideal for encrypting data at rest, where you do not need to share the key with another
entity.

Page |1
Asymmetric key encryption (also known as public key cryptography) differers from the prior,
symmetric key encryption, because it makes use of two separate keys for its encryption and
decryption processes. This makes it more secure in terms of key exchange, since the decryption key
is only held by one party, so long as its kept secret the data it decrypts is secure.

The basic idea of public-key cryptography are public keys. Each person’s key
is separated into two parts: a public key for encryption available to everyone
and a secret key for decryption which is kept secret by the owner.

- (Delfs and Knebl p33)

Asymmetric encryption techniques however have been known to produce slower encryption
algorithms. Its is due to these factors that in most practical cryptographic systems both symmetric
and asymmetric encryption techniques are used in tandem to supplement either shortcomings.

Financial data is sensitive information that would benefit from the use of both these techniques
rather than one on its own. When storing large datasets using symmetric encryption will be optimal
due to its higher efficiency. When sharing information over a network, a secret key could be shared
using asymmetric encryption because of its smaller size whilst still maintaining privacy; and then
transitioning to symmetric encryption which is, again, more efficient when handling large data.

Page |2
References

1. Delfs Hans and Helmut Knebl. Introduction to Cryptography: Principles and Applications. 2nd ed.,
Springer, 2007.

2. GeeksforGeeks. “Difference Between Symmetric and Asymmetric Key Encryption.” GeeksforGeeks,


May 2023, www.geeksforgeeks.org/difference-between-symmetric-and-asymmetric-key-encryption.

3. Adetunji, Daniel. “Symmetric and Asymmetric Key Encryption – Explained in Plain English.”
freeCodeCamp.org, Apr. 2023, www.freecodecamp.org/news/encryption-explained-in-plain-english.

Page |3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy