Listing the pros and cons of each solution

Assignment Help Computer Network Security
Reference no: EM13334226

1. The security firm that employs you has been hired by a new customer. This customer developed in-house, custom application system that archives papers forms in electronic format, complete with a web-based document locator function that works a fallows: users type in keywords in a search engine, related to the document that they are looking for the application returns several possibilities. User can then click on the appropriate document title, and it downloaded from the back-end database and displayed on the user's screen. It is noteworthy that the user not employees of the company in question. This company offers the application as a third party service. All its clients are medical practices that use the application as on offside electronic medical records solution. They are linked to the application via their Internet connection and a regular web browser.

2. After spending a day with the developer's responsible for this application reviewing the code, your first recommendation is that since all the information that is transmitted is in fact a Protected Health information (PHI), all transactions should be encrypted. As it presently stands, the application system is sending all the documents between the database server and the user' desktop via HTTP (i.e., in clear text). Write a couple of paragraphs making a case that first thing that should be done to the application system is to retrofit an encryption solution.

3. It is settled that application will be sending all information via HTTPS, the secure version of HTTP that relies on SSL to guarantee confidentiality. You know that there are two choices to set up https: Either use certificates created in-house. Write a couple of paragraphs on the matter, specifically listing the pros and cons of each solution. Finally, make a recommendation of using one or the other method.

4. One the medical practices than contracted to use this application system, as its EMR solution is located outside of the United States, but still requires 128-bit encryption. Explain a paragraph how that can be an issue. Research U.S. Federal Regulations that govern exporting encryption technology on the Internet for more information on this topic if necessary.

5. Another need than you identified trough the audit than you ran against this application system is that e-mails are being sent between clients a managers. However, the integrity and nonrepudiation of the e-mail sent is not currently guaranteed. Write a paragraph to outline a solution that could be deployed to remedy this issue.

Reference no: EM13334226

Questions Cloud

Describe the common critical mistakes entrepreneurs : Describe the common critical mistakes entrepreneurs make when developing pro-forma financial statements. Also, discuss the impact each of these errors would have on the business if not avoided.
What is the total rate of flow in the pipes : A viscous liquid is flowing steadily through a pipe of diameter D. Suppose you replace it by 7 parallel pipes, what is the total rate of flow in the 7 pipes compared to the original flow rate
Explain why compound fails to react as a diels-alder diene : Explain why this compound fails to react as a diels-alder diene- 2 hexagons joined in middle with a double bond in each
Find the self-inductance of this solenoid : A technician wraps wire around a tube of length 40 cm having a diameter of 7.8 cm. Find the self-inductance of this solenoid
Listing the pros and cons of each solution : Explain a paragraph how that can be an issue. Research U.S. Federal Regulations that govern exporting encryption technology on the Internet for more information on this topic if necessary.
Determine what will be the optimal cash return point : Veggie Burgers, Inc., would like to maintain their cash account at a minimum level of $200,000; but expect the standard deviation in net daily cash flows to be $1,000; the effective annual rate on marketable securities to be 4.7 percent per year
Potential problems in multicultural teams : Potential Problems in Multicultural Teams
Determine the maximum current in the circuit : A sinusoidal voltage ?v = (65 V) sin (130t) is applied to a series RLC circuit with L = 10 mH, C = 120 ?F, and R = 50 ?. What is the maximum current in the circuit
Determine what is the aftertax cost of debt : Mullineaux Corporation has a target capital structure of 65 percent common stock, 10 percent preferred stock, and 25 percent debt. Its cost of equity is 11 percent, the cost of preferred stock is 6 percent

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd