Listing the pros and cons of each solution

Assignment Help Computer Network Security
Reference no: EM13334226

1. The security firm that employs you has been hired by a new customer. This customer developed in-house, custom application system that archives papers forms in electronic format, complete with a web-based document locator function that works a fallows: users type in keywords in a search engine, related to the document that they are looking for the application returns several possibilities. User can then click on the appropriate document title, and it downloaded from the back-end database and displayed on the user's screen. It is noteworthy that the user not employees of the company in question. This company offers the application as a third party service. All its clients are medical practices that use the application as on offside electronic medical records solution. They are linked to the application via their Internet connection and a regular web browser.

2. After spending a day with the developer's responsible for this application reviewing the code, your first recommendation is that since all the information that is transmitted is in fact a Protected Health information (PHI), all transactions should be encrypted. As it presently stands, the application system is sending all the documents between the database server and the user' desktop via HTTP (i.e., in clear text). Write a couple of paragraphs making a case that first thing that should be done to the application system is to retrofit an encryption solution.

3. It is settled that application will be sending all information via HTTPS, the secure version of HTTP that relies on SSL to guarantee confidentiality. You know that there are two choices to set up https: Either use certificates created in-house. Write a couple of paragraphs on the matter, specifically listing the pros and cons of each solution. Finally, make a recommendation of using one or the other method.

4. One the medical practices than contracted to use this application system, as its EMR solution is located outside of the United States, but still requires 128-bit encryption. Explain a paragraph how that can be an issue. Research U.S. Federal Regulations that govern exporting encryption technology on the Internet for more information on this topic if necessary.

5. Another need than you identified trough the audit than you ran against this application system is that e-mails are being sent between clients a managers. However, the integrity and nonrepudiation of the e-mail sent is not currently guaranteed. Write a paragraph to outline a solution that could be deployed to remedy this issue.

Reference no: EM13334226

Questions Cloud

Describe the common critical mistakes entrepreneurs : Describe the common critical mistakes entrepreneurs make when developing pro-forma financial statements. Also, discuss the impact each of these errors would have on the business if not avoided.
What is the total rate of flow in the pipes : A viscous liquid is flowing steadily through a pipe of diameter D. Suppose you replace it by 7 parallel pipes, what is the total rate of flow in the 7 pipes compared to the original flow rate
Explain why compound fails to react as a diels-alder diene : Explain why this compound fails to react as a diels-alder diene- 2 hexagons joined in middle with a double bond in each
Find the self-inductance of this solenoid : A technician wraps wire around a tube of length 40 cm having a diameter of 7.8 cm. Find the self-inductance of this solenoid
Listing the pros and cons of each solution : Explain a paragraph how that can be an issue. Research U.S. Federal Regulations that govern exporting encryption technology on the Internet for more information on this topic if necessary.
Determine what will be the optimal cash return point : Veggie Burgers, Inc., would like to maintain their cash account at a minimum level of $200,000; but expect the standard deviation in net daily cash flows to be $1,000; the effective annual rate on marketable securities to be 4.7 percent per year
Potential problems in multicultural teams : Potential Problems in Multicultural Teams
Determine the maximum current in the circuit : A sinusoidal voltage ?v = (65 V) sin (130t) is applied to a series RLC circuit with L = 10 mH, C = 120 ?F, and R = 50 ?. What is the maximum current in the circuit
Determine what is the aftertax cost of debt : Mullineaux Corporation has a target capital structure of 65 percent common stock, 10 percent preferred stock, and 25 percent debt. Its cost of equity is 11 percent, the cost of preferred stock is 6 percent

Reviews

Write a Review

Computer Network Security Questions & Answers

  Description of des encryption feistel structure algorithm

Prove that y’ = c(y) (i.e., if we complement the plaintext and the key, then the ciphertext is also complemented). [This is Question 3.3 of the textbook. Hint: this can be proved using the “high-level” description of DES encryption Feistel structure ..

  Explain cross site scripting attack

Explain Cross Site Scripting attack

  Describe what security threats in installing wireless lan

Write a two- page letter to describe what security threats she is facing and how she can decraese these threats. Remember that you are writing for friend, not for a teacher.

  Prepare a security checklist for new century

You decide to prepare a security checklist for New Century. Prepare a list of security issues that the firm should evaluate and monitor. Be sure to organize the items into categories that match the five security levels.

  Technical versus soft skills

Suppose that there is some consensus with basic premise that most skills can be learnt, which would you expect to be the more productive task,

  Recall that a computer virus is malware

Recall that a computer virus is malware that relies on someone or something (other than itself) to propagate from one system to another. Write a computer virus that can be written to other empty text documents by running the batch program.

  Determine public values transmitted for message

Alice and Bob select the numbers 6 and 10 privately. What will be public values they transmit and what would be final secret computed?

  Determine the legal and ethical considerations

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  What is virtualization

What is virtualization and what are the benefits and tradeoffs and explain at least three common virtual technologies that are used.

  Basic function / purpose of a firewall

What is the basic function / purpose of a firewall? What are some different firewall implementations (stateful inspection, dual-homed, etc) and how might an organization use firewalls

  How system with capabilities as access control mechanism

Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

  How to protect communications by eavesdropper

Assume that evil Charlie eavesdropped on Bob's message to server. How can he with the help of his equally evil buddy Don, extract key K that Alice and Bob are using to protect their communications?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd