How could the contracts manager further secure this file

Assignment Help Basic Computer Science
Reference no: EM132132555

The contracts manager at a company needs to make a large legal document available to an overseas customer. However, she has some challenges: The document contains sensitive information; it is too large to send via e-mail, and the manager is expecting an amended document in return. The contracts manager must make the document available in an electronic format to only herself and the customer. First, the contracts manager sets up an FTP account that requires usernames and passwords. She gives these usernames and passwords to the customer and instructs him not to divulge the account information to anyone. She reveals authentication information to the customer only across a secure channel (or in person). Next, the contracts manager sets up a folder on the company FTP site into which she can upload the sensitive document. She ensures that only users with specific permissions can access the folder. The contracts manager now gives the customer permissions to upload and download files to and from this folder.

How could the contracts manager further secure this file? Could she use S/FTP to secure the file? Could she use FTPS? Consider some of the other Internet services discussed in this lesson. Which ones would be inappropriate for transmitting this file? Why?

Reference no: EM132132555

Questions Cloud

Contrast the importance of lease as investment : Compare and contrast the importance of a lease as an investment, from the Landlord’s view and from the Tenant’s views.
Performance on the training data set : With regards to data mining/ business analytics, Why is it not ideal to evaluate a classifier's performance on the training data set?
Initiating phase for project : Which steps already performed by Mary Kate are part of the initiating phase for this project? Which steps are part of the planning phase?
Write a paper on the topic american revolution : Write a paper on the topic American Revolution (before Civil War) 4-5 page long in APA format.
How could the contracts manager further secure this file : How could the contracts manager further secure this file? Could she use S/FTP to secure the file? Could she use FTPS?
Which type of european colonization system do you believe : Which type of European colonization system do you believe had the most significant impact on the history of North America: Spanish, French, or British?
Create a detailed outline for your research paper : Create a detailed outline for your research paper. The detailed outline should have an outline for the following: Literature review
Camera-based systems : What advantages and or disadvantage does such a system have compared to camera-based systems?
Explain why jacob zuze was advised to register for vat : Question - Client - Jacob Zuze - Explain why Jacob Zuze was advised to register for VAT when he commenced to trade on 1 September 2017

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Conduct a literature review - artificial intelligence

Conduct a literature review, researchers locate relevant articles and review them - For this assignment, you will use the South University Online Library

  Fetch-execute cycle for an add instruction

You may assume that the op code part of the instruction uses IR [high] and that the address is found in IR [low]. Write the fetch-execute cycle for an ADD instruction on this machine.

  Personal and organizational solutions

Create a 8 - 12 slide power point that discusses whether cognitive overload is a problem in work or education. What personal and organizational solutions can you recommend for this problem?

  Develop an inspirational vision statement

Develop an inspirational vision statement to effectively lead the team. Describe the process you used to develop the vision statement. Describe business strategy and strategic thinking.

  Describe the temporal characteristics of a controlled object

Compare the error-detection latency in systems with and without jitter.

  Difference between a da and a dba

Describe the 3-level architecture to include a description of data independence as well as the difference between a DA and a DBA.

  Determine the coefficient of static friction

Determine the coefficient of static friction between the friction pad at A and ground if the inclination of the ladder isθ = 60 ° and the wall at B is smooth.

  Explain type to reveal computer to be computer

Explain why you think these questions would be the type to "reveal" the computer to be a computer? Why would these responses have to be given a human begin?

  Interest rate risk of longer-term bonds

What does this problem tell you about the interest rate risk of longer-term bonds?

  What is spyware? would this include keylogging at work?

What is spyware? Would this include keylogging at work?

  An investigation on the elements

At the point when directing an investigation on the elements, which add to a percentage of the issues shoppers experienced with the IPhone 6/6 or more, it was apparent that one of the memory chips was defective. This memory chip, fabricated by Samsun..

  Which of the servers are involved in the kerberos protocol

Which of the following servers are involved in the Kerberos protocol

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd