Conducting additional research

Assignment Help Basic Computer Science
Reference no: EM131223096

For this Discussion, consider the following scenarios that involve transmitting confidential information: 

  1. A mid-sized company has about 250 employees and needs to transmit employee payroll data to the vendor that manages employee contributions towards their retirement plans.
  2. A hospital sends approximately 25 images daily from patients' scans to a clinic of radiologists. The radiologists read the scans and send reports back to the hospital.
  3. A life insurance company has about 1,500 independent agents all over the country. Every day, the agents file electronic application forms from prospective clients to their assigned corporate offices.

Identify a firm from any one of the above scenarios. Based on your readings and upon conducting additional research, suggest two data transmission methods that your chosen firm could use. Explain the risks associated with each alternative. Which method would you recommend for this firm and why?

Next, explain the risks and benefits of applications that use Public Key Cryptography to encrypt files or messages (such as PGP) and the risks and benefits for transport-layer security applications, where the files and messages may not be encrypted, but the data stream can be (such as an IPsec VPN or FTPS). Does your recommended method fall under either of the two categories? Why or why not?

Reference no: EM131223096

Questions Cloud

Why the strategy for storing check constraint values : Explain why the strategy for storing CHECK constraint values in a separate table is better than implementing them in a table-based constraint. How can this strategy be used to implement the constraint on ARTIST. Nationality?
Would you make the same choices presented in the film : Technological and medical advancements have improved the quality of life for most people around the world. However sometimes science loses objectivity as can be seen in "My Sister's Keeper". What are some of the consequences of scientific advancem..
Create the warm and cold fronts on the weather map : Create the warm and cold fronts on the Weather Map. While this map will not need to be turned in, it will assist you in filling out the information in the data table.
Individual income tax: research question : Thomas Wither submitted his 2016 tax return on time and elected married filing jointly status with his wife, Sarah Wither. Thomas and Sarah did not request an extension for their 2016 tax return. Their tax liability for 2016 was determined to be 110,..
Conducting additional research : Identify a firm from any one of the above scenarios. Based on your readings and upon conducting additional research, suggest two data transmission methods that your chosen firm could use. Explain the risks associated with each alternative. Which m..
Document the requirements for the area application : Define and document the requirements for the Area application. Describe the stakeholders needed to help further define the application. Describe a collaboration plan for working with stakeholders.
Discuss the role of intermediate sanctions as a punishment : In your initial response, discuss the role of intermediate sanctions as a punishment alternative within corrections. Begin your response by defining the concept of intermediate sanctions as it applies to corrections. Provide specific examples of d..
Set to be paid off with equal monthly payments : A $100,000 20-yr loan at 6%/yr nominal rate compounded monthly is set to be paid off with equal monthly payments. Then the borrower decides to make two voluntary payments of $10K @n=6 and $20K @n=11 (in place of the regular monthly payments). How muc..
Difference between complete and differential backups : What is the difference between complete and differential backups? Under what conditions are complete backups preferred? Under what conditions are differential backups preferred?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the output of the following loop

What is the output of the following loop

  Describe the combination geometrically

Solve the equation aux + buy + u = 0 with Cauchy data u(s) = e-s along the straight lines (x(s),y(s)) = (cs,ds). The solution breaks down for a particular combination of a,b,c and d. Describe the combination geometrically and explain it in terms o..

  Define common and emerging security issues

Evaluate an organization's security policies and risk management procedures, and its ability to provide security countermeasures.

  Filling weight for boxes of cereal

The filling weight for boxes of cereal is designed to have a variance .02 ounces or less. A sample of 41 boxes of cereal shows a sample standard deviation of .16 ounces. Use α .05 to determine whether the variance in the cereal box filling weight ..

  How old are they now

A good old-fashioned word problem. Don't forget use rref() and the backslash method to solve it. Peter is four times older than Mary. In four years, he will be two times older. How old are they now? How to solve using matlab?

  Draw a diagram showing the reference variables i and j

Draw a diagram showing the reference variables i and j

  Parts of the management style of company

Include these thoughts in your answer: What parts of the management style of this company do you agree and disagree with and why?

  Communication between it and business professionals

1. You must agree that during the course of your career (and education) you will be working with teams made up of members with varying degree of technical and business knowledge. It is fair to say that communication between IT and business profes..

  Why is remote access security important in software security

Why is Remote Access Security important in software security? Please provide at least one website used as source.

  Function drawlinegraph that generates a line graph

Write a function DrawLineGraph that generates a line graph given an array of x-coordinate values, a second array of corresponding y-coordinate values, and the number of data points.

  Find the optimal solution

Find the optimal solution using simplex algorithm only.solve manually

  Degree of security in time-shared machine dedicated machine

Write down two such problems? Can we make sure same degree of security in time-shared machine as in dedicated machine?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd