Question

In: Computer Science

Show that the Clinical Information System model’s principles implement the Clark-Wilson enforcement and certification rules. Please...

Show that the Clinical Information System model’s principles implement the Clark-Wilson enforcement and certification rules.

Please keep your answer concise.

Solutions

Expert Solution

Hello, Student I hope you are doing great in lockdown.

Here is answer of your question,still if you have any doubt then feel free to ask in comment section, I am always happy to help you.

Please upvote.

Q)Show that the Clinical Information System model’s principles implement the Clark-Wilson enforcement and certification rules.

Answer: -

We know that Information systems security has  three essential properties of information:

1.Confidentiality

2.Integrity

3.Availability

These characteristics of information are major concerns throughout the commercial and military industry.

At that time Confidentiality is most important because of its importance in military,and they do not want to disclosure any of information, but at same time commercial security systems wants to ensure that the integrity of data is protected from improper modifications and inappropriate actions performed by unauthorized users. And further David D. Clark and David R. Wilson argue that the integrity of the information is more important than its confidentiality in most commercial systems.

After this everyone has started developing sophisticated models and mechanisms for confidentiality so they can provide confidentiality in information systems.

Clark-Wilson (CW) model :-

1.Integrity

Data integrity is defined as the, quality, correctness, authenticity, and accuracy of information stored within an information system.Systems integrity is the successful and correct operation of information resources. Together, these definitions define integrity as information is not modified in unauthorized ways, that it is internally consistent and consistent with the real-world objects that it represents, and that the system performs correctly.

Security Policy The goal of information systems is to control or manage the access of subjects (users, processes) to objects (data, programs). This control is governed by a set of rules and objectives called a security policy.

There are three goals of integrity:

• Prevent unauthorized modifications

• Maintain internal and external consistency

• Prevent authorized but improper modifications

To accomplish these goals, a collection of security services that embody the properties needed for integrity as well as a framework for composing them is needed. The needed security properties for integrity include integrity, access control, auditing, and accountability. The Clark-Wilson (CW) model is an integrity, application level model which attempts to ensure the integrity properties of commercial data and provides a framework for evaluating security in commercial application systems.

Certification Rules :-

1. C1 (IVP Certification) - The system will have an IVP for validating the integrity of any CDI

2. C2 (Validity) - The application of a TP to any CDI must maintain the integrity of that CDI. CDIs must be certified to ensure that they result in a valid CDI

3.C3 - A CDI can only be changed by a TP. TPs must be certified to ensure they implement the principles of separation of duties & least privilege

4.C4 (Journal Certification) - TPs must be certified to ensure that their actions are logged

5.C5 - TPs which act on UDIs must be certified to ensure that they result in a valid CDI

Enforcement Rules :-

1.  E1 (Enforcement of Validity) - Only certified TPs can operate on CDIs

2.E2 (Enforcement of Separation of Duty) - Users must only access CDIs through TPs for which they are authorized

3. E3 (User Identity) - The system must authenticate the identity of each user attempting to execute a TP

4. E4 (Initiation) - Only administrator can specify TP authorizations The CW model differs from the other models that allow subjects to gain access to objects directly, rather than through programs

The access triple is at the heart of the CW model, (Summers) which prevents unauthorized users from modifying data or programs. From what is presented above, we see that the CW model shows that the rules seek to enforce the needed security properties for integrity, which are described below: [18] Integrity An assurance that CDIs can only be modified in constrained ways to produce valid CDIs. This property is ensured by the rules: C1, C2, C5, E1 and E4. Access control The ability to control access to resources. This is supported by the rules: C3, E2 and E3. Auditing The ability to ascertain the changes made to CDIs and ensure that the system is in a valid state. This is ensured by the rules C1 and C4.

Clark-Wilson Model :

Rule 1. The sy stem will hav e an IVP f or v alidating the integrity of any CDI.

Rule 2.The application of a TP to any CDI must maintain the integrity of that CDI

Rule 3. A CDI can only be changed by a TP

Rule 4. Subjects can only initiate certain TPs on certain CDIs

Rule 5. CW-triples must enf orce some appropriate separation of duty policy on subjects

Rule 6. Certain special TPs on UDIs can produce CDIs as output

Rule 7. Each TP application must cause inf ormation suff icient to reconstruct the application to be written to a special append-only CDI

Rule 8. The sy stem must authenticate subjects attempting to initiate a TP

Rule 9. The sy stem must only permit special subjects (i.e., security officers) to make any authorization-related lists.

last words:

Confidentiality, integrity, availability are very important and much related aspects of security. To achieve any of these goals, the objective is to strike a balance between applying generally accepted models and incorporating the latest security technologies and products, applying security patches, risk management, adhering to industry standards and guidelines, and implementing sound management principles to achieve secure systems.

Feel free to ask in comment section (if needed).

Please do not forget to hit that like or thumbs-up button, it really motivates me<3

Thank you!!

Have a nice day:)


Related Solutions

Answer all four questions please 1-Explain how the principles and rules of clinical ethics can be...
Answer all four questions please 1-Explain how the principles and rules of clinical ethics can be applied in medical practice ? 2-What are the main strategies to create the Research Ethics Committees? 3-How can the communication breakdown ethical conflicts? 4-What are the categories in Sharia Law System and how they applied?
Use a style sheet to define the following rules and implement the given HTML code. Please...
Use a style sheet to define the following rules and implement the given HTML code. Please put your style information within the same file as the HTML code. Rules • Hyperlinks using the nodec class should display no decoration. • Hyperlinks should display text in white with a green background color when the mouse pointer is held over the link. (use the hover pseudo-class) • Unordered lists not nested within any other lists should be displayed in blue text and...
what are the five fundamental principles of accounting information system?
what are the five fundamental principles of accounting information system?
What are the physical/engineering/clinical principles of Optical coherence tomography. Please TYPE answer.
What are the physical/engineering/clinical principles of Optical coherence tomography. Please TYPE answer.
Consider a pharmacy information system (as a subsystem of the clinical information systems) A3.1. Discuss in...
Consider a pharmacy information system (as a subsystem of the clinical information systems) A3.1. Discuss in a structured way all the inputs and then the outputs from a pharmacy information system. A3.2. Describe the links of a pharmacy system to other health care information systems. A3.3. What are the benefits that may occur as a result of the use of a computerized pharmacy information system.
Discuss how the court system and its procedures, rules and principles promote settlement in civil litigation in Manitoba Courts.
Discuss how the court system and its procedures, rules and principles promote settlement in civil litigation in Manitoba Courts.
Please show solution and comments for this data structure using java.​ Implement a program in Java...
Please show solution and comments for this data structure using java.​ Implement a program in Java to convert an infix expression that includes (, ), +, -, *,     and / to postfix expression. For simplicity, your program will read from standard input (until the user enters the symbol “=”) an infix expression of single lower case and the operators +, -, /, *, and ( ), and output a postfix expression.
Consider a radiology practice system (as a subsystem of the clinical information systems) (200p for task...
Consider a radiology practice system (as a subsystem of the clinical information systems) (200p for task A4 ): A4.1 70p Describe the most typical 5-6 features of a radiology practice system. A4.2. 60p What are the general IS selection criteria that would be applicable if you have to choose a particular radiology practice system for a hospital. A4.3.70 p What physical security means and what authentication means would be suitable for a radiology practice system.
Consider a radiology practice system (as a subsystem of the clinical information systems) A4.1 Describe the...
Consider a radiology practice system (as a subsystem of the clinical information systems) A4.1 Describe the most typical 5-6 features of a radiology practice system. A4.2. What criteria would be applicable if you have to choose a particular radiology practice system for a hospital. A4.3.What physical security means and authentication means would be suitable for a radiology practice system.
This is an Accounting Information System assignment Identity and explain these 5 principles important to Accounting...
This is an Accounting Information System assignment Identity and explain these 5 principles important to Accounting Information System reliability. A function of an Accounting Information System is to provide internal controls to ensure data integrity. What is meant by the term internal control? Identify and explain 3 main types of internal control. Outline a control in the revenue cycle which could be relied on to ensure that all sales are properly captured in a manual Accounting System and therefore enhance...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT