Conducting additional research

Assignment Help Basic Computer Science
Reference no: EM131223096

For this Discussion, consider the following scenarios that involve transmitting confidential information: 

  1. A mid-sized company has about 250 employees and needs to transmit employee payroll data to the vendor that manages employee contributions towards their retirement plans.
  2. A hospital sends approximately 25 images daily from patients' scans to a clinic of radiologists. The radiologists read the scans and send reports back to the hospital.
  3. A life insurance company has about 1,500 independent agents all over the country. Every day, the agents file electronic application forms from prospective clients to their assigned corporate offices.

Identify a firm from any one of the above scenarios. Based on your readings and upon conducting additional research, suggest two data transmission methods that your chosen firm could use. Explain the risks associated with each alternative. Which method would you recommend for this firm and why?

Next, explain the risks and benefits of applications that use Public Key Cryptography to encrypt files or messages (such as PGP) and the risks and benefits for transport-layer security applications, where the files and messages may not be encrypted, but the data stream can be (such as an IPsec VPN or FTPS). Does your recommended method fall under either of the two categories? Why or why not?

Reference no: EM131223096

Troubleshooting creativity

Identify an instance in which an individual or group was unsuccessful in using creative thinking to solve a problem, such as the passage of prohibition in the United States

Verify local police department-s findings on current case

Your computer investigation firm has been hired to verify local police department's findings on current case. Tension over the case is running high in the city.

What pointers would give to classmate to make that process

Discuss your experience with working with text and designing a presentation in PowerPoint 2013. How can the Format Painter be beneficial? Discuss themes and when more than o

Objectives of defining network security

About Information Security Fundamentals, Security Policies, and Operations Life Cycle - Based on the weeks objectives of defining network security and business priorities tha

When should events be used instead of loops

Modify the world to use an event instead of a loop to make the pterodactyl fly while the world is running. You might need to refer back to Chapter 3, which covers events.

What needs to be done to avoid such problem

Based on our class discussion regarding E-R Diagrams, if an attribute is appearing in a number of entity sets does this situation lead to the issue of data redundancy? If ye

Create a schematic of the crankshaft

Figure 22.65. Create a schematic of the crankshaft, which rotates clockwise, and use a phantom line to show its path of motion. Use phantom lines to show the piston in its e

Apply the algorithm to k-d trees

a. We can rebuild a node in O(S), where S is the weight of the node. b. The algorithm has amortized cost of O(log N) per insertion. c. We can rebuild a node in a k-d tree in O


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd