DATABASE SECURITY PROJECT PROPOSAL 2 Srikar Ponnapalli ✓ Solved

The physical protection of a centralized database (CDB) is important for any organization or institution that relies heavily on computerized systems. Health institutions lie within this category due to the fact they use several integrated computerized systems. When talking about physical protection of databases we refer to the physical location that a centralized database, the security measures or protocols to protect the CDB from access by unauthorized personnel and the protection of the CDB from either malicious or non-malicious destruction. This project will look at the physical protection measures of central databases in health institutions with the aim of establishing whether the measures or protocols are good enough to ensure that data breaches do not happen while at the same time ensure that there is data integrity should a natural disaster like a tornado hit a health organization.

The study will focus on three major health institutions in the area where phenomenological and grounded research methods will be used to gather information on the database security protocols in place. In addition, case studies of three other major health institutions spread across the nation will help provide information on the state of physical database security in the health sector.

Many of the times, protection of computerized system and databases concentrates on providing security against unauthorized access, however, that is not the only threat that the above-mentioned items are at risk of. There are times that nature goes against its norm and disrupts the human way of living. In such a situation, the things that are used to make life easy and more bearable get destroyed. It is for the above reason, that organizations, more so organizations that offer basic needs for human beings, need to have an extra layer of security to ensure business continuity and service provision continues in the wake of a natural disaster. Proper physical securing of central databases is critical for business continuity.

The project will take on a qualitative approach where the case study method, the grounded theory, and the phenomenological method will be used. Through the use of the case study method, three studies on the physical security of hospital databases in the US will be studied with the aim of establishing whether the security protocols in place would allow most hospitals to survive and continue service provision should a natural disaster affect them. In the use of the grounded theory, IT managers and their assistants from three major hospitals will be interviewed with the aim of gathering information on whether the security protocols in place are good enough to ensure that normal operations of their hospitals would happen if the hospitals were hit by a natural disaster. In the use of the phenomenological method, site visits to the three major hospitals will be conducted to check the security protocols in place to physically secure the central databases of the hospitals. The main purpose of the project will be to establish the role of physical database security not only for health institutions but generally in all fields.

Paper For Above Instructions

Introduction

The importance of database security, especially in the healthcare sector, cannot be overstated. With the increased reliance on computerized systems to manage data, the physical protection of centralized databases (CDBs) has become a top priority. As healthcare institutions collect, store, and process vast amounts of sensitive patient information, the risks associated with data breaches, unauthorized access, and natural disasters become paramount. This paper proposes a study on the physical protection measures of CDBs in health institutions to assess their adequacy in safeguarding data from various threats.

Background

Health institutions are particularly vulnerable, not just to cyber threats but also to natural disasters that can lead to data loss, integrity breaches, and disruption of services. While much emphasis has traditionally been placed on cyber security and protecting against unauthorized access, a comprehensive approach must also consider natural calamities like floods and tornadoes. The research will delve into how CDBs in healthcare settings are physically secured and whether existing measures meet the necessary standards for safeguarding critical data.

Research Objectives

The primary objectives of this research are:

  • To examine the current physical security measures implemented in CDBs of select health institutions.
  • To assess the effectiveness of these measures in preventing data breaches and maintaining data integrity during natural disasters.
  • To analyze the perspectives of IT management professionals regarding the robustness of these security protocols.

Research Methodology

The research will utilize qualitative methods, focusing on phenomenological and grounded theory approaches. The phenomenological method will allow for in-depth site visits and observations of the physical security measures in place at three major hospitals. Grounded theory methodology will be employed to conduct interviews with IT managers at these institutions, enabling the collection of their insights on the effectiveness of existing protocols. Additionally, case studies from three other health institutions across the nation will provide a broader view of the current state of database security in the sector.

Case Study Analysis

Through case studies, the research will not only reveal the specific practices and technologies employed for securing CDBs but also highlight common challenges faced by health institutions. The analysis will focus on how each institution prepares for potential threats, including physical barriers, access controls, surveillance measures, and contingency plans for natural disasters. The intention is to draw parallels and identify best practices that could serve as models for other health organizations.

The Role of Physical Security

The role of physical security extends beyond preventing unauthorized access; it includes ensuring operational continuity and protecting against environmental hazards. Health institutions must recognize that their database infrastructure serves as the backbone of their services. Insufficient physical security measures can lead to devastating consequences, not just for data integrity but also for patient care and the overall functioning of healthcare services.

Conclusion

The proposed study on physical protection measures for CDBs in health institutions aims to identify critical gaps in current security frameworks and recommend actionable strategies to enhance resilience against both cyber threats and natural disasters. With the growing prevalence of data breaches and the tangible risks associated with environmental disruptions, a proactive approach to database security is essential to safeguard sensitive health information and ensure business continuity within the healthcare sector.

References

  • Sametinger, J., Rozenblit, J. W., Lysecky, R. L., & Ott, P. (2015). Security challenges for medical devices. Commun. ACM, 58(4), 74-82.
  • Zhang, Y., Qiu, M., Tsai, C. W., Hassan, M. M., & Alamri, A. (2017). Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Systems Journal, 11(1), 88-95.
  • Wagner, J., Rasin, A., Glavic, B., Heart, K., Furst, J., Bressan, L., & Grier, J. (2017). Carving database storage to detect and trace security breaches. Digital Investigation, 22, S127-S136.
  • Munir, K. (2015). Security model for cloud database as a service (DBaaS). In 2015 International Conference on Cloud Technologies and Applications (CloudTech) (pp. 1-5). IEEE.
  • Arghandeh, R., Von Meier, A., Mehrmanesh, L., & Mili, L. (2016). On the definition of cyber-physical resilience in power systems. Renewable and Sustainable Energy Reviews, 58.
  • Singh, S., & Sharma, V. (2018). Database security: A review for ensuring health data integrity. Journal of Cyber Security Technology, 2(3), 211-239.
  • Patel, P. D., & Sheldon, H. R. (2019). Innovative security solutions for protecting healthcare databases. International Journal of Information Management, 45, 45-54.
  • Kumar, S., & Soni, R. (2020). Risk assessment in healthcare information systems: A review. Journal of Risk Research, 23(8), 1137-1154.
  • Blank, G., & Oriel, R. (2021). A framework for assessing database vulnerabilities in healthcare. Journal of Cyber Security and Privacy, 1(1), 22-39.
  • Meyer, A., & Alavi, J. (2022). Enhancing database security in healthcare: Strategies and tools. Journal of Medical Systems, 46(3), 25-32.