Transmitting confidential information

Assignment Help Basic Computer Science
Reference no: EM131218787

For this Discussion, consider the following scenarios that involve transmitting confidential information: 

  1. A mid-sized company has about 250 employees and needs to transmit employee payroll data to the vendor that manages employee contributions towards their retirement plans.
  2. A hospital sends approximately 25 images daily from patients' scans to a clinic of radiologists. The radiologists read the scans and send reports back to the hospital.
  3. A life insurance company has about 1,500 independent agents all over the country. Every day, the agents file electronic application forms from prospective clients to their assigned corporate offices.

Identify a firm from any one of the above scenarios. Based on your readings and upon conducting additional research, suggest two data transmission methods that your chosen firm could use. Explain the risks associated with each alternative. Which method would you recommend for this firm and why?

Next, explain the risks and benefits of applications that use Public Key Cryptography to encrypt files or messages (such as PGP) and the risks and benefits for transport-layer security applications, where the files and messages may not be encrypted, but the data stream can be (such as an IPsec VPN or FTPS). Does your recommended method fall under either of the two categories? Why or why not?

Reference no: EM131218787

Questions Cloud

Find particular use of excel interesting : Why did you find this particular use of Excel interesting? Would you consider this use of Excel to be for good or could it be leading to the improper use of computer technology?  Explain your answer.
Find the time varying autocorrelation function : This process is sometimes used as a model for random noise.- Find the time-varying autocorrelation function. - Find the PSD of this process.
How affirmative action relates to race and ethnicity : In a Word document, submit your topic of interest, tell how affirmative action relates to race and ethnicity or social change, and explain what you hope to learn from this topic. You will also provide a brief summary of the article.
Transmitting confidential information : For this Discussion, consider the following scenarios that involve transmitting confidential information:
Transmitting confidential information : For this Discussion, consider the following scenarios that involve transmitting confidential information: A mid-sized company has about 250 employees and needs to transmit employee payroll data to the vendor that manages employee contributions towa..
Find the psd of given process : Show that X(t) is WSS, but not strict sense stationary. Hint: For the latter case consider E[X3(t)] . - Find the PSD of this process.
How a swot analysis can help companies maximize their market : Write a white paper, in which you describe how a SWOT analysis can help companies maximize their marketing strategies in a global context. Support your views with appropriate evidence.
Distinguish between mobile subscriber : Distinguish between mobile subscriber, ISDN number and mobile station roaming?
Setup a wireless lan : You are to setup a wireless LAN. What are some of the interferences that you should watch for?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Differences between stand-alone risk and diversifiable risk

What will happen to the portfolio's risk if more andmore randomly selected stocks are added?

  Processes that have a particular file pathname open

Write a program that lists all processes that have a particular file pathname open

  Describe the adjacency-lists representation

Exhibit a family of networks for which the maximum-augmenting-path algorithm needs 2E lg M augmenting paths.

  Reported a debt-to-equity ratio

Tiggie's Dog Toys, Inc. reported a debt-to-equity ratio of 1.78 times at the end of 2015. If the firm's total debt at year-end was $28 million, how much equity does Tiggie's have on its balance sheet? (Enter your answer in millions of dollars roun..

  Accuracy of data input is important what method of data

prepare a 2- to 3- page apa paper that includes the followingmiddot accuracy of data input is important. what method of

  Ieee 754 32-bit floating point values

Convert the following numbers to IEEE 754 32-bit floating point values (display results in hexadecimal)

  Define the topic is e-business and e-commerce security

The Topic is E-business/e-commerce security, Graphics are allowed but do not apply for the minimum page count.

  How much would it be to beef

How much would it be to beef the answers up another 100 -150 words per answer.

  Techniques for establishing requirements

Software design engineers use different data gathering techniques for establishing requirements. Requirements come in many different forms and levels of abstraction, but need to be very specific and unambiguous. Of the two different kinds of requi..

  Create or modify a user ea for a file

Write a program that can be used to create or modify a user EA for a file

  Internet changes consumer and supplier relationships

Considering a focus in area of E-Commerce (EC), how would you think Internet changes consumer and supplier relationships?

  Develop a program that determines the monthly charges

Develop a program that determines the monthly charges for a checking account. the following criteria is to be used.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd