Question: You are a contracting officer’s technical representative, a security system engineer, at a military hospital. Your department’s leaders are adopting a new medical health care database management system. And they’ve tasked you to create a request for proposal for which different vendors will compete to build and provide to the hospital.
A request for proposal, or RFP, is when an organization sends out a request for estimates on performing a function, delivering a technology, or providing a service or augmenting staff. RFPs are tailored to each endeavor but have common components and are important in the world of IT contracting and for procurement and acquisitions.
To complete the RFP, you must determine the technical and security specifications for the system. You’ll write the requirements for the overall system and also provide evaluation standards that will be used in rating the vendor’s performance. Your learning will help you determine your system’s requirements.
As you discover methods of attack, you’ll write prevention and remediation requirements for the vendor to perform. You must identify the different vulnerabilities the database should be hardened against.
Deliverables: An RFP, 10 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report.
Requirements: 10 pages
please use a bold subheadings.
Answer preview
An additional point to note is the fact that not only are these threats hypothetical, but they are also quite dynamic, and as such, are imperfectly known (Murray, 2010). This is because when a threat remains a potential, the facility will have to first wait for it to unfold. Only when this happens will Carl R. Darnall Army Medical Center understand the impact such threat will have on the facility and then come up with a plan that addresses these impacts and prevent the threat from affecting the facility in the future. Even though in the worst-case scenario, such a situation will lead to a loss, Carl R. Darnall Army Medical Center believes that the security controls installed within its database will not only minimize such losses but also guarantee the recovery of patient data housed within the database and protect it from future similar attacks (Murray, 2010).
[3574 Words]