Issues of usefulness and security

Assignment Help Basic Computer Science
Reference no: EM131193551

Scenario:

A federal agency has asked your cybersecurity consulting firm to provide it with a white paper that discusses the issues of usefulness and security in regards to Open Data. The white paper is intended for a group of executives at the agency who are opposed to the planned conversion of its current controlled distribution for several highly valuable and frequently requested datasets (DVDs purchased through the Government Printing Office) to OPEN Data distribution via the government's Data.Gov portal (website). Currently, these data sets are purchased by businesses and academic institutions and are used for a variety of purposes.

A customer satisfaction survey revealed that purchasers are willing to change over to the new Open Datadistribution method for data sets. But, the agency head has received phone calls from several large and politically well-connected customers who expressed concerns about potential issues with the integrity andauthenticity of downloaded data. The agency's executives were also surveyed and they provided the following security-related items in a list of concerns for the planned conversion to an Open Data delivery method:

  1. Confidentiality / Privacy (ensuring proper redaction)
  2. Data integrity
  3. Data authenticity
  4. Availability (reliability) of the Open Data service (website)
  5. Non-repudiation of data sets

Reference no: EM131193551

Questions Cloud

What would be your first steps as a self-directed dfe team : You have decided to begin by creating a self-directed DfE team. What internal organizations should be represented on your team, and why? What would be your first steps as a self-directed DFE team?
Analyze organizational factors associated with business : Analyze organizational factors associated with business high performance. Evaluate the impact of change on people, processes, products and organizations.
During reagan administration-laffer curve was used to argue : During the Reagan administration, the Laffer curve was used to argue that:
Write corresponding digital signal using 4-bit represetation : An analog voice signal that can vary over the range 0.50 mA is digitized by sampling it at 8 kHz. The first four sample values are 10, 21, 36, and 16 mA. Write the corresponding digital signal (a string of 1 and 0 bits) by using a 4-bit representa..
Issues of usefulness and security : A federal agency has asked your cybersecurity consulting firm to provide it with a white paper that discusses the issues of usefulness and security in regards to Open Data.
Various configurations of operating and closed plants : Evaluate the various configurations of operating and closed plants that will meet weekly demand. Determine which configuration minimizes total costs.
Fiscal policy promotes an increase in aggregate supply : Assume Aggregate Demand (AD) is fixed. If fiscal policy promotes an increase in Aggregate Supply (AS), what happens to GDP and price levels? If the Federal Reserve wants to decrease the money supply, it should:
What helpful advice or resources do you have to share : What helpful advice or resources do you have to share? If you had writing problems similar to those described by a peer, what helped you improve your writing?
What data collection and feedback concerns : What data collection and feedback concerns might an Oganizational Development consultant have when collecting and analyzing information? Provide two or more examples and cite using APA guidelines.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What transport protocols

What transport protocols

  The relevant theory and/or research inform

What specifically worked well? How do I know it worked well? What specifically worked least well? Why do I think that?

  Identify the population-the units

In each of the following situations, identify the population, the units, each variable, and tell if the variable is categorical or quantitative. If it is quantitative, then identify it further as either discrete or continuous.

  What is government surveillance

What is government surveillance? Is it essential to National security or a violation of my privacy?

  Deprecated expense and accumulated depreciation

What is the difference between deprecated expense and accumulated depreciation?

  Organizations antivirus policy and anti-virus applications

Should an organization's anti-virus policy specify that anti-virus applications will be configured to quarantine infected files instead of deleting them automatically?

  How to hack the most common web browser

Discuss and explain how to hack the most common Web browser. Also include methods for securing Web browsers. Include at least two different Web browsers in your discussion.

  Can you simply augment this function with code

Can you simply augment this function with code for these new actions, or do you need to fundamentally re-structure how the function works

  What kind of watermarking mechanism

What kind of watermarking mechanism can you propose to protect an image copyright?

  Determine the number of gates needed to implement

Determine the number of gates needed to implement an eight-bit carry-lookahead adder assuming that the maximum fan-in for the gates is four.

  Critical issues related to it governance-determine

Read the scenario below and identify the critical issues related to IT Governance and determine how you would resolve the issues. Write a 3 page paper that addresses the following issues:

  Evaluate online tutorials and online communities

Evaluate online tutorials and online communities in regard to helping users. Create an argument for the approach you find to be the most effective and explain why.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd