Listing the pros and cons of each solution

Assignment Help Computer Network Security
Reference no: EM13334226

1. The security firm that employs you has been hired by a new customer. This customer developed in-house, custom application system that archives papers forms in electronic format, complete with a web-based document locator function that works a fallows: users type in keywords in a search engine, related to the document that they are looking for the application returns several possibilities. User can then click on the appropriate document title, and it downloaded from the back-end database and displayed on the user's screen. It is noteworthy that the user not employees of the company in question. This company offers the application as a third party service. All its clients are medical practices that use the application as on offside electronic medical records solution. They are linked to the application via their Internet connection and a regular web browser.

2. After spending a day with the developer's responsible for this application reviewing the code, your first recommendation is that since all the information that is transmitted is in fact a Protected Health information (PHI), all transactions should be encrypted. As it presently stands, the application system is sending all the documents between the database server and the user' desktop via HTTP (i.e., in clear text). Write a couple of paragraphs making a case that first thing that should be done to the application system is to retrofit an encryption solution.

3. It is settled that application will be sending all information via HTTPS, the secure version of HTTP that relies on SSL to guarantee confidentiality. You know that there are two choices to set up https: Either use certificates created in-house. Write a couple of paragraphs on the matter, specifically listing the pros and cons of each solution. Finally, make a recommendation of using one or the other method.

4. One the medical practices than contracted to use this application system, as its EMR solution is located outside of the United States, but still requires 128-bit encryption. Explain a paragraph how that can be an issue. Research U.S. Federal Regulations that govern exporting encryption technology on the Internet for more information on this topic if necessary.

5. Another need than you identified trough the audit than you ran against this application system is that e-mails are being sent between clients a managers. However, the integrity and nonrepudiation of the e-mail sent is not currently guaranteed. Write a paragraph to outline a solution that could be deployed to remedy this issue.

Reference no: EM13334226

Questions Cloud

Describe the common critical mistakes entrepreneurs : Describe the common critical mistakes entrepreneurs make when developing pro-forma financial statements. Also, discuss the impact each of these errors would have on the business if not avoided.
What is the total rate of flow in the pipes : A viscous liquid is flowing steadily through a pipe of diameter D. Suppose you replace it by 7 parallel pipes, what is the total rate of flow in the 7 pipes compared to the original flow rate
Explain why compound fails to react as a diels-alder diene : Explain why this compound fails to react as a diels-alder diene- 2 hexagons joined in middle with a double bond in each
Find the self-inductance of this solenoid : A technician wraps wire around a tube of length 40 cm having a diameter of 7.8 cm. Find the self-inductance of this solenoid
Listing the pros and cons of each solution : Explain a paragraph how that can be an issue. Research U.S. Federal Regulations that govern exporting encryption technology on the Internet for more information on this topic if necessary.
Determine what will be the optimal cash return point : Veggie Burgers, Inc., would like to maintain their cash account at a minimum level of $200,000; but expect the standard deviation in net daily cash flows to be $1,000; the effective annual rate on marketable securities to be 4.7 percent per year
Potential problems in multicultural teams : Potential Problems in Multicultural Teams
Determine the maximum current in the circuit : A sinusoidal voltage ?v = (65 V) sin (130t) is applied to a series RLC circuit with L = 10 mH, C = 120 ?F, and R = 50 ?. What is the maximum current in the circuit
Determine what is the aftertax cost of debt : Mullineaux Corporation has a target capital structure of 65 percent common stock, 10 percent preferred stock, and 25 percent debt. Its cost of equity is 11 percent, the cost of preferred stock is 6 percent

Reviews

Write a Review

Computer Network Security Questions & Answers

  Define the repository usernames and passwords

Install the distributed revision control system subversion from the Debian package of the same name. After installation you will need to configure subversion to be usable.

  Define intellectual property in cyberspace

Develop a one-page poster in Word or PowerPoint for a public service campaign to educate people about intellectual property rights of cyberspace for some aspect in your readings from this week.

  Mini case: cisco systems

Mini Case: Cisco Systems

  Using rsa user ciphers text m with other user public key

Using RSA User1 ciphers his text M with User2 public key and he gets the cipher text C=371 he sends the Ciphertext to User2 who decrypts the cophertext with his private key.

  A digital evidence and computer crime and technology and law

Digital Evidence, Computer Crime, Technology and Law- As digital criminals have become more sophisticated, security-related incidents have become substantially more diverse in nature, and their impact on society is increasingly more destructive.

  Explain why you were unable to complete this part

Modify the attached code to include a exportToJSON method within the Cave object. This method should output the JSON version of our Cave, which should be identical to the JSON within Cave.dat for that particular Cave.

  Explain the purpose of the entity company code

Explain the purpose of the entity ‘Company Code'. How many company codes can an enterprise have and why?

  What rc4 key value will completely invert s

What RC4 key value will completely invert S after the initial permutation (so that S[0] = 255, S[1] = 254, ..., S[254] = 1, S[255] = 0)?  Show your work. (Explain how you got this.)

  Find at least four sites that offer malware listings

Search a number of antivirus companies websites and find at least four sites that offer malware listings and compare their latest malware lists

  What are the security issues of this

The majority of Australian SMEs are not taking advantage of cloud computing services, though uptake is strengthening among individuals, according to new research.

  Cost-of-use issues are of client-dominant local area network

What technology and cost-of-use issues are associated with a client-dominant local area network? Think about what happens as the network grows in size.

  What is a honeypot

How has honeypots been used in the field of national security?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd