Entrepreneurs is starting a new data storage

Assignment Help Basic Computer Science
Reference no: EM13714437

QII.1 For a public-key encryption system, list reasons,
1) in favor of
2) and against
for using the same key pair for the encryption and the digital signature


QII.2 Describe "inference controls"
Give reasons why they are needed.
And give specific examples (at least 3), and
Describe how the inference controls are implemented; how they serve the purpose (effective) in a database.

QII.3 Describe the "crypto dilemma."
Suggest 3 ways to address the "crypto dilemma."
State the pros and cons of each way.

Part 3: Essay Question. Maximum length: 900 words, ( weight 20 pts.)

An enterprising group of entrepreneurs is starting a new data storage and retrieval business, SecureStore, Inc. For a fee, the new company will accept digitalized data (text and images, multimedia), and store it on hard drives until needed by the customer. Customer data will be transmitted to and from SecureStore over the Internet. SecureStore guarantees that the confidentiality and integrity of the data will be maintained.

SecureStore also envisions certain information assurance requirements for their internal operations. Company employees will need to exchange confidential email, and will need a mechanism for verifying the integrity and originator of some email messages. Also, SecureStore intends a daily backup of all customer data to a remote facility via a leased line. They wish to do so as economically as possible, while ensuring the data's confidentiality and integrity.

SecureStore is interviewing candidates for the position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy SecureStore's requirements as stated above. How would a successful candidate respond?

First, distill the requirements from the above statements; once you have them then please address each requirement in a separate paragraph. Keep in mind that this business will be operating in the real world, which means please pay attention to economics. If you are unsure about the requirements, send them to me, I will comment on it.

Reference no: EM13714437

Questions Cloud

The three most important deliverables in scope definition : What are the three most important deliverables in scope definition? What are some benefits and potential problems in using an abrupt cut-over conversion and in using a parallel conversion strategy?
Wireless local area network : Internet Intranet (local area network, wide area network, and metropolitan area network) Extranet (interactive voice response, automatic call distributor, call routing, and dialer) Wireless local area network (LAN)
Declare and instantiate a two-dimensional int array : 1. Declare and instantiate a two-dimensional int array called temperatures which contains four rows (corresponding to weeks) and seven columns (corresponding to days) with the initial values 73, 71, 68, 69, 75, 77, and 78 in the first row, 76, ..
Several telephony technologies currently available : 2. Based on your research, write an 6-8 page paper that researches the concept of internet telephony, as well as providing an analysis and comparison of several telephony technologies currently available.
Entrepreneurs is starting a new data storage : An enterprising group of entrepreneurs is starting a new data storage and retrieval business, SecureStore, Inc. For a fee, the new company will accept digitalized data (text and images, multimedia), and store it on hard drives until needed by t..
Heat engine is powering a carnot cycle refrigerator : For a Carnot cycle, with water as the operating fluid, the following steps are known to occur. The water changes from saturated liquid to saturated vapor at 200°C as heat is added. Heat is rejected at constant pressure at 20 kPa.
Create a new table for suppliers contact information : 1. Create a new table for Suppliers' contact information and set the primary key and appropriate data types for the fields. The table should at least contain the following information: a. Company name and address  b. Representative's name, pho..
What is the mass flow rate of air-heat exchanger : A compressor receives 0.1 kg/s R-134a at 150 kPa, -10C and delivers it at 1000 kPa, 40C. The power input is measured to be 3 kW. The compressor has heat transfer to air at 100 kPa coming in at 20C and leaving at 30C (i.e. like a heat exchanger). What..
What is a typical pearlite structure : Using the iron-Carbon equilibrium phase diagram, please describe the lines of transformation to austenite during heating with carbon content

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Provide permission to get financial amounts

System to have employees register and provide permission to get financial amounts from dental insurance and retirement companies.

  Give a formal proof

Give a formal proof

  Write a program that calculates the total cost of gasoline

Write a program that calculates the total cost of gasoline.

  Corporate goal for scr new training activity

We require corporate goal for SCR which refers to new training activity. Create a draft to show Jesse. Draft project scope statement for TIMS system

  Illustrate how the asymptotic notation can be used to rank

To illustrate how the asymptotic notation can be used to rank the efficiency of algorithms, use the relations "C " and "=" to put the orders of the following functions into a sequence, where e is an arbitrary real constant, 0

  Make sure the formatted string contains only 2 digits

Make sure the formatted string contains only 2 digits following the decimal point. Store the formatted string into a String variable called str.

  Create an inheritance hierarchy

Finally add an abstract method named Print which will be implemented in the derived classes.

  Pi requests a unit of ri and a unit of r3

pi requests a unit of Ri and a unit of R3.

  Necessarily memorize to the best of the machine abilities

If a researcher uses computer models for studying the memorization capabilities of the human mind, do the programs developed for the machine necessarily memorize to the best of the machine's abilities? Explain.

  What is the probability of receiving 4 messages such that

Assume that the probability of a received message having an error is 0.10 (errors are independent). What is the probability of receiving 5 good (that is, error free) messages? What is the probability of receiving 4 messages such that 1 or more messag..

  Explain cause and effect transition happen

One process could cause another process to make a transition. Under what circumstance, if any, would the following. Cause and effect transition happen ?

  Why would you use the const keyword

What is the const keyword in C++? Why would you use the const keyword?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd