medihub_guy
Member
- Local time
- Today, 14:04
- Joined
- Aug 12, 2023
- Messages
- 66
Tbh I find comfort in knowing no application is perfect. It gives me affirmation that I can get there and I'm allowed to make mistakes.
And now I see more detailed information on implementing security posted by Edgar.The better question is, do you have concerns?
You've taken an important step by moving the data into a more secure database; I assume that's SQL Server or SQL Azure or one of the other options available, given the move to a web-based interface.
Any time you take possession of customer data, you have to be concerned about data breaches, IMO. You are handling prescription information for potentially thousands of patients. I don't know what the laws are in the Bahamas, so I can't say they are more, or less, strict, than in Europe or the US. All I know for sure is that security is a higher level of concern when that kind of information is under your control.
Interoperability and data security are probably always going to be in tension. It seems to me that having 100% security and 100% interoperability at the same time is not realistic. So, the goal, I think, is to provide adequate security and as much interoperability as you can achieve under that context.
It also occurs to me to wonder what interoperability means, and not just in this context. Does that mean Pharmacy A should be able to directly retrieve prescription information for a customer from pharmacy B? If so, the whole idea of segregating data is out the window anyway. Does it mean being able to retrieve that data via your intervention as the administrator? What are the implications of that? What responsibility do you have to ensure that Pharmacy A has a legitimate reason to get that information?
How else might that interoperability be defined and implemented? My Personal Care Provider seems to have the ability to communicate directly with my pharmacy. I doubt that the pharmacy has access to my health records, and I doubt the PCP has access to the pharmacy's records. They both know enough about me, though, to make prescribing meds a simple phone call or email, or perhaps some other method of electronic communication. Is that the interoperability we're aiming for?
I'm just noodling ideas here, to be honest. This started as a bit of concern over commingling what seems to be, at least in the US and probably in most jurisdictions, very sensitive data. And wondering what liability you might be incurring by doing so.
I apologize, though, for not taking time to fully explain the reason for my original question to you.
@GPGeorge thank you so much for offering your advice. You've given me a lot to think about.The better question is, do you have concerns?
You've taken an important step by moving the data into a more secure database; I assume that's SQL Server or SQL Azure or one of the other options available, given the move to a web-based interface.
Any time you take possession of customer data, you have to be concerned about data breaches, IMO. You are handling prescription information for potentially thousands of patients. I don't know what the laws are in the Bahamas, so I can't say they are more, or less, strict, than in Europe or the US. All I know for sure is that security is a higher level of concern when that kind of information is under your control.
Interoperability and data security are probably always going to be in tension. It seems to me that having 100% security and 100% interoperability at the same time is not realistic. So, the goal, I think, is to provide adequate security and as much interoperability as you can achieve under that context.
It also occurs to me to wonder what interoperability means, and not just in this context. Does that mean Pharmacy A should be able to directly retrieve prescription information for a customer from pharmacy B? If so, the whole idea of segregating data is out the window anyway. Does it mean being able to retrieve that data via your intervention as the administrator? What are the implications of that? What responsibility do you have to ensure that Pharmacy A has a legitimate reason to get that information?
How else might that interoperability be defined and implemented? My Personal Care Provider seems to have the ability to communicate directly with my pharmacy. I doubt that the pharmacy has access to my health records, and I doubt the PCP has access to the pharmacy's records. They both know enough about me, though, to make prescribing meds a simple phone call or email, or perhaps some other method of electronic communication. Is that the interoperability we're aiming for?
I'm just noodling ideas here, to be honest. This started as a bit of concern over commingling what seems to be, at least in the US and probably in most jurisdictions, very sensitive data. And wondering what liability you might be incurring by doing so.
I apologize, though, for not taking time to fully explain the reason for my original question to you.
Hi George,Both Pat and Edgar know more about this area than I do. I will defer to them, therefore, on specifics. I will only comment that you've described the scenario where an "average user" follows the rules. I brought up the potential risk from a malicious invader getting to the data of one customer in one of your client accounts and from there being able to find all other customers' data in all other client accounts.
How can I facilitate interoperability between these databases?
Globally, there is a huge push towards interoperability between pharmacy management applications within a given jurisdiction. To date, the United States has difficulty achieving this despite government incentivized initiatives and laws.
My market is The Bahamas. Interoperability is a lot more achievable/manageable here as there are <100 pharmacies that are potential clients for my application. Perhaps this can give you a better insight of why I've taken the route I've taken.
Data security is one of the reasons why Access is less ideal for my application and why I have decided to utilize a web-based application. All available advice pertaining to locking down a front end file comes with a clause that "any experienced access developer would be able to bypass your front end security". This is why, in my opinion, Access is not an option for a large scale enterprise. Boy do I wish it was though. I've spent a great deal of hours learning VBA when i could have been learning another programming language. BUT this was the advantage Access had over the others - it was easy and developing an application was relatively quick. So, Access has served its purpose i.e. being a functional prototype. I would recommend Access to any developer just getting started for that reason alone. Get in quick with your prototype and adjust your application to industry feedback. Once you have a design that works for most, make the switch!
So now, given that an Access front end file is no longer in the equation, do you still have concerns of a data breach?
What you probably should do is hire someone who specializes in security to evaluate your system directly. Moreover, It seems inappropriate to try to do that in an open forum. My point was never to try to pin down specifics, but to try to raise awareness of the risk I see.Hi George,
Thanks for still offering your opinion. Again though, this goes for anyone willing to answer, can you paint the picture of how exactly the hacker can get in? Theoretically, what are the weak points of an application as i described considering all security steps are taken?
The weakpoints of a web application depend entirely on the architecture and technologies chosen to make it work. You could connect via ODBC drivers (you are familiar with these, for Access), with an ORM, with a direct user/password connection, Serverless (like Firebase, AWS, etc), among others, of which the most common may very well be REST API. Each has its pros and cons. As a web developer, I've used all of the ones I mentioned, but I have a tendency to design using REST API and Serverless the most, so I could tell you about these.this goes for anyone willing to answer, can you paint the picture of how exactly the hacker can get in? Theoretically, what are the weak points of an application as i described considering all security steps are taken?
SELECT * FROM users WHERE username = 'input_username' AND password = 'input_password';Username: attacker' OR '1' = '1Password: passwordSELECT * FROM users WHERE username = 'attacker' OR '1' = '1' AND password = 'password';Most hackers will give up when they find out you're using strong passwords, NOT default usernames, NOT default configurations, etc. Don't leave anything by default, the attackers know these vulnerabilities very well, so be creative in your credentials and configurations. Some configurations considered "good practices" may become "good possibilities" for a hacker, the best aid in that case is NOT naming things commonly and obfuscating exposed code.
That's a great analogy, the more difficult it is for the hacker to exploit your application, the less likely they are to stay and search for other vulnerabilities. They'll give up, unless there's monetary incentive.this was sometimes called the "low hanging fruit"