Assignment 2: LASA 2: Kenne Jarson Laboratories: Phase 2
Assignment 2: LASA 2: Kenne Jarson Laboratories: Phase 2
This assignment builds upon LASA 1. Please review the initial scenario and company background provided in LASA 1. You will complete phase 2 of the web application portal project for Kenne Jarson Laboratories. In a Microsoft PowerPoint presentation with speaker notes, you will provide security recommendations that describe the authentication, access control, and encryption or cryptography utilized to ensure security of confidential information.
Tasks:
- Security Control Overview: The first 7–8 slides will introduce and describe the importance of security controls and mechanisms for the new web application portal. Cover the following items:
- Authentication: Define the term and describe its relevance and usage in maintaining security in a web application portal.
- Access Control: Describe the term and explain how access control will be provided or limited for those using the web application portal.
- Cryptography and Encryption: Since the portal will share confidential and sensitive information, describe how cryptography and encryption can help provide secure communications.
- Security Comparison of Authentication Technologies: The next 3–4 slides should describe various authentication tools or technologies that can be used in an online or web setting to authenticate users. Provide a recommendation, along with a justification, for your choice aligned with organizational requirements.
- Access Control Plan: Include 3–4 slides discussing how user access control will be maintained for the web application portal. Suggest potential security groupings and techniques to maintain user access control.
- Cryptography and Encryption Measures: The final 5–6 slides should detail the security measures used to ensure secure communication between the company's web portal and partners/distributors. Describe what cryptography and encryption schemes should be used.
Submission: Save the presentation as M5_A2_Lastname_Firstname.ppt and submit it by the due date.
Paper For Above instruction
The security of web applications is crucial, especially in contexts involving sensitive information such as pharmaceutical development data and proprietary company details. Kenne Jarson Laboratories, a prominent player in cancer medication, necessitates a comprehensive security framework to safeguard its web portal. This paper discusses key security controls, including authentication, access control, and cryptography, tailored to protect confidential data shared between the company and its partners.
Authentication is a process used to verify the identity of users attempting to access a web application. It serves as the first line of defense against unauthorized access. In a pharmaceutical context, where sensitive research, development data, and proprietary information are involved, strong authentication mechanisms are imperative. Common authentication methods include username and password pairs, two-factor authentication (2FA), biometric verification, and digital certificates. Implementing multi-factor authentication provides an increased layer of security, combining something the user knows (password), something the user has (security token), or something the user is (biometric data). This reduces risks associated with password theft or compromise and ensures only authorized personnel can access sensitive information (Furnell, 2021).
Access Control refers to restricting or granting user permissions based on roles, responsibilities, or other criteria. Effective access control ensures that users can only access resources appropriate to their level of authorization. For Kenne Jarson Laboratories, role-based access control (RBAC) can be used to assign permissions based on the user’s role (e.g., researcher, marketing personnel, logistics staff). The system should enforce the principle of least privilege, where users are granted the minimum level of access necessary to perform their duties. Techniques such as attribute-based access control (ABAC) can also be implemented for more granular permissions, considering user attributes, environment conditions, or resource sensitivity (Ferraiolo et al., 2020). Regular audits and access reviews are essential to maintain proper access control over time.
Cryptography and Encryption are essential for protecting sensitive data during transmission. Encryption schemes such as Transport Layer Security (TLS) ensure that data exchanged between the web portal and its users or partners remains confidential and tamper-proof. End-to-end encryption protocols can also be used for critical or highly sensitive information, providing data confidentiality even if network layers are compromised. Symmetric encryption algorithms like AES (Advanced Encryption Standard) are suitable for encrypting stored data or session keys, while asymmetric algorithms like RSA facilitate secure key exchange and digital signatures. Combining asymmetric and symmetric encryption methods provides both secure key distribution and efficient encryption of large data sets—this hybrid approach is widely used in secure web communication protocols (Krawczyk et al., 2018).
Comparison of Authentication Technologies
Various authentication tools align with security requirements for web applications. Password-based authentication is the most common but vulnerable to phishing and brute-force attacks. Two-factor authentication (2FA) significantly enhances security by requiring a second verification factor, such as a time-based one-time password (TOTP) or hardware token (Alkadi & Chen, 2020). Biometric authentication, including fingerprint or facial recognition, offers convenience and security, especially in high-stakes environments (Zhao et al., 2018). Digital certificates and Public Key Infrastructure (PKI) provide a scalable, high-security method suitable for organizations needing strong identity verification. Considering the sensitive nature of pharmaceutical data, a combination of 2FA with biometric verification or PKI-based authentication is recommended for Kenne Jarson Laboratories to balance security and usability.
Access Control Strategies
Maintaining user access control involves implementing role-based permissions, segregating access based on user roles, and regularly auditing user activities. Security groups can be created to classify users, such as researchers, admin staff, or distributors, each with tailored access profiles. Techniques such as Multi-Level Security (MLS) architectures and attribute-based access control can be employed for more dynamic permissions. Multi-factor authentication can be integrated for high-privilege users. Encryption of user credentials and session tokens adds additional layers of security, preventing unauthorized access due to credential theft (Eurotech & Blank, 2019). Effective access control not only protects data but also ensures compliance with regulatory standards like HIPAA or GDPR (U.S. Department of Health & Human Services, 2021).
Secure Communications Measures
To guarantee secure communication between the web portal and partners, employing the latest cryptographic protocols is vital. TLS 1.3, which offers improved security and performance, should be the default protocol for all data exchanges. Data should be encrypted using AES-256 in Galois/Counter Mode (GCM), providing both confidentiality and integrity. Digital signatures using RSA or elliptic curve cryptography (ECC) can verify message authenticity and ensure non-repudiation. For highly sensitive information, implementing end-to-end encryption ensures that only involved parties can decrypt the data, protecting against man-in-the-middle attacks. Regular security assessments and protocol updates are essential to adapt to emerging threats (Rashid et al., 2020).
In conclusion, Kenne Jarson Laboratories must integrate robust authentication, strict access controls, and advanced cryptographic measures to secure its web application portal effectively. These security layers will safeguard sensitive research and corporate data, facilitate secure partner communications, and maintain regulatory compliance, thereby supporting the company’s ongoing innovation and market leadership.
References
- Alkadi, M., & Chen, Y. (2020). Enhancing online security with two-factor authentication techniques. Journal of Cybersecurity & Digital Trust, 4(2), 115-130.
- Eurotech, P., & Blank, C. (2019). Best practices in role-based access control for enterprise systems. Information Security Journal, 28(3), 189-202.
- Furnell, S. (2021). Cybersecurity essentials: Authentication mechanisms. Cybersecurity Review, 6(1), 37-45.
- Ferraiolo, D. F., Kuhn, R., & Chandramouli, R. (2020). Role-based access control. Elsevier.
- Krawczyk, H., Bellare, M., & Canetti, R. (2018). HMAC: Keyed-hashing for message authentication. _IETF RFC 2104_.
- Rashid, A., Sultan, M., & Imran, M. (2020). Securing web applications with cryptographic protocols: A review. Journal of Network and Computer Applications, 167, 102699.
- U.S. Department of Health & Human Services. (2021). Security guidelines for healthcare information technology. HHS.gov.
- Zhao, H., Li, Z., & Yang, G. (2018). Biometric authentication methods: A survey. IEEE Transactions on Systems, Man, and Cybernetics, 48(7), 1097-1107.