Why does pipeda have any rulings on digital signatures

Assignment Help Computer Engineering
Reference no: EM131945071

Assignment

Complete the assigned reading and review the case study below and Respond to the questions below in a 3 pages Word document.

Case Study Example

With DTGOV's client portfolio expanding to include public-sector organizations, many of its cloud computing policies have become unsuitable and require modification. Considering that public-sector organizations frequently handle strategic information, security safeguards need to be established to protect data manipulation and to establish a means of auditing activities that may impact government operations.

DTGOV proceeds to implement the digital signature mechanism specifically to protect its Web-based management environment (Figure 10.6). Virtual server self-provisioning inside the IaaS environment and the tracking functionality of realtime SLA and billing are all performed via Web portals. As a result, user error or malicious actions could result in legal and financial consequences. Image Figure 10.6 Whenever a cloud consumer performs a management action that is related to IT resources provisioned by DTGOV, the cloud service consumer program must include a digital signature in the message request to prove the legitimacy of its user. Digital signatures provide DTGOV with the guarantee that every action performed is linked to its legitimate originator. Unauthorized access is expected to become highly improbable, since digital signatures are only accepted if the encryption key is identical to the secret key held by the rightful owner. Users will not have grounds to deny attempts at message adulteration because the digital signatures will confirm message integrity.

Answer the following questions in a substantive manner:

1. Do you agree that digital signatures are the best way to protect the data in question?

2. Do you agree with the author's statement that digital signatures provide a guarantee that every action performed is linked to its legitimate originator?

3. DTGOV appears to be Canadian based. Does PIPEDA have any rulings on digital signatures?

Reference no: EM131945071

Questions Cloud

Qualifications to be eligible for earned income credit : The taxpayer must meet certain qualifications to be eligible for earned income credit. Which statements pertaining to earned income credit with qualifying child
Medium of exchange and unit of account : Gold may be a better store of value than US money, but would function as a poorer medium of exchange and unit of account than US money."
Workplace and enhance audience sensitivity : Provide a solution for how "emotional intelligence" can be utilized to improve your workplace and enhance audience sensitivity.
Develop definition of global citizenship : After reading the article by Reysen and Katzarska-Miller, explain why there has been disagreement between theorists about the definition of global citizenship.
Why does pipeda have any rulings on digital signatures : Do you agree that digital signatures are the best way to protect the data in question? Why does PIPEDA have any rulings on digital signatures?
How adopting the assumptions and factual claims : Next, consider how adopting the assumptions and factual claims associated with "American Exceptionalism" may explain the choices our government
For purpose of the earned income credit : For purpose of the earned income credit, who would be able to claim Liza as a qualified child if Mitch and Kandy are unable to reach an agreement?
Explain what can be mined from such an e-mail database : Explain what can be mined from such an e-mail database? How a data mining system may take this as the training set to automatically classify new e-mail message?
Major oil producing countries generate : Where is oil stored for the long term? Provide the dollar volume and number of barrels that the major oil producing countries generate?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Why has shared virtual memory become a necessity

Why has shared virtual memory become a necessity in building a scalable system with memories physically distributed over a large number of processing nodes?

  What happens if you run exec csh in a unix shell

What happens if you run "exec ls" in a UNIX shell? Why?

  What are the solutions to address those barriers

What are connectivity standards and how do they affect the capability of one provider to connect to another?

  Discuss the three different classes of digital signatures

Differentiate among the three different classes of digital signatures

  Role of a teacher for an online university

For this assignment, you will assume the role of a teacher for an online university.

  Write routine to display pie chart with appropriate labeling

write a routine todisplay a ple chart with appropriate labeling. lnput to the routine is to include a data set giving the distribution of the data.

  When dynamically allocating memory for a specific data type

when dynamically allocating memory for a specific data type explain why a pointer variable of the same data type must

  Drawbacks of supporting links to files that cross mount

explain the advantages and disadvantages of supporting links to files that cross mount points (that is, the file link refers to a file that is stored in a different volume).

  Design traffic light controller as a digital controller

In this assignment, you are asked to design, implement and demonstrate the Traffic Light Controller as a Digital controller as hardware (using remote lab or DSX kit).

  Create a power point presentation about inclusion

Create a Power Point Presentation about inclusion. The audience for this presentation is teachers. The presentation could be used for a teacher in-service to help alleviate teacher concerns about including students with disabilities in the classro..

  What is the time complexity

What is the output when n = 2, n = 4, and n = 6? What is the time complexity T(n)? You may assume that the input n is divisible by 2.

  Determine the controllers monitored and controlled variables

Determine five of the controller's monitored and controlled variables. Describe each variable and explain how it is used in the system. Propose five mode classes and five terms that may be helpful in monitoring this system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd