Benefits for transport-layer security applications

Assignment Help Basic Computer Science
Reference no: EM131220685

For this Discussion, consider the following scenarios that involve transmitting confidential information: 

  1. A mid-sized company has about 250 employees and needs to transmit employee payroll data to the vendor that manages employee contributions towards their retirement plans.
  2. A hospital sends approximately 25 images daily from patients' scans to a clinic of radiologists. The radiologists read the scans and send reports back to the hospital.
  3. A life insurance company has about 1,500 independent agents all over the country. Every day, the agents file electronic application forms from prospective clients to their assigned corporate offices.

Identify a firm from any one of the above scenarios. Based on your readings and upon conducting additional research, suggest two data transmission methods that your chosen firm could use. Explain the risks associated with each alternative. Which method would you recommend for this firm and why?

Next, explain the risks and benefits of applications that use Public Key Cryptography to encrypt files or messages (such as PGP) and the risks and benefits for transport-layer security applications, where the files and messages may not be encrypted, but the data stream can be (such as an IPsec VPN or FTPS). Does your recommended method fall under either of the two categories? Why or why not?

Reference no: EM131220685

Questions Cloud

How events affects the amount of m1 that people hold : Explain how each of these events affects the amount of M1 that people hold: - ATMs are invented. - Credit cards are invented.
How many times does it produce any square that it produces : Assume we plan to use k Reduce tasks. For each of your joins from (a), into how many buckets should you hash each of W, X, Y , and Z in order to minimize the communication cost?
Identify and summarize the purpose of your interview : Identify and summarize the purpose of your interview. How will the information you gather be used? Explain how you will structure the interview and your reasoning behind the structuring of the interview. Include a list of topics you plan to cover.
How much has been swept into an mmda : How much of the money you deposit is actually in the account on a typical day, and how much has been swept into an MMDA?
Benefits for transport-layer security applications : Next, explain the risks and benefits of applications that use Public Key Cryptography to encrypt files or messages (such as PGP) and the risks and benefits for transport-layer security applications, where the files and messages may not be encrypted, ..
What differences or similarity did you see with both solids : What differences/similarities did you see with both solids? Explain the importance of taking the mass of each individual substance involved in a system. Explain the importance of units for each variable involved in Gibbs Free Energy equation.
How does given change the series of transactions : Recall the transactions that are triggered when you pay your rent. - How does this change the series of transactions?
Distinguish between mobile subscriber : Distinguish between mobile subscriber, ISDN number and mobile station roaming?
Identify an element of the hernandez family case : Identify an element of the Hernandez family's case that may influence the way Juan and Elena Hernandez address their issue with the social worker. Explain how the genogram you created might help you address the needs of the Hernandez family.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Aspects of designing business presentations

Create an 8- to 10-slide presentation that should be 5 to 10 minutes in length. Please include detailed speaker notes, based on the Week 4 Persuasive Messages Part I & Part II assignment. Apply the four aspects of designing business presentations dis..

  Fill out forms providing all candidate information

Interface with applicable external systems such as the Educational Testing Service (ETS)in order to import standardized test scores

  Write a program that reads a file containing two columns

write a program that reads a file containing two columns of floating-point numbers. prompt the user for the file name. print the average of each column in c++.

  Relationship between mutual information and copula''s entropy

To derive Eq. (10.50) on the relationship between mutual information and a copula's entropy, we used a direct approach. Following a procedure similar to that described for deriving Eq. (10.49), rederive Eq. (10.50).

  Why an organization prefer one approach over the other

As a system analyst, which would you prefer? Why? Can the two approaches be successfully combined? Explain. In all cases, support your analysis with specific examples from your readings, research, and professional experience (if applicable).

  Software engineering for postgraduates

In software engineering for postgraduates what is the answer to below question Apart from the risks of software projects stated inyour textbook, identify at least six other possible risks that could arise insoftware projects.

  Create the work breakdown structure

Create the work breakdown structure (WBS) as shown in the textbook listing the tasks that will need to be completed to meet the project's objectives.

  Explain what bgp would do with this situation

Explain what BGP would do with this situation.

  An information security professional

Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.

  Spreadsheet applications (excel)

The Excel PMT function is used to calculate the payment for a loan based on constant payments and a constant interest rate.

  Conduct research on the types of computer networks

Conduct research on the types of computer networks

  Mark the stuffed bits

show the bit sequence transmitted over the link when the frame contains the following bit sequence: 110101111101011111101011111110 Mark the stuffed bits.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd