Benefits for transport-layer security applications

Assignment Help Basic Computer Science
Reference no: EM131220685

For this Discussion, consider the following scenarios that involve transmitting confidential information: 

  1. A mid-sized company has about 250 employees and needs to transmit employee payroll data to the vendor that manages employee contributions towards their retirement plans.
  2. A hospital sends approximately 25 images daily from patients' scans to a clinic of radiologists. The radiologists read the scans and send reports back to the hospital.
  3. A life insurance company has about 1,500 independent agents all over the country. Every day, the agents file electronic application forms from prospective clients to their assigned corporate offices.

Identify a firm from any one of the above scenarios. Based on your readings and upon conducting additional research, suggest two data transmission methods that your chosen firm could use. Explain the risks associated with each alternative. Which method would you recommend for this firm and why?

Next, explain the risks and benefits of applications that use Public Key Cryptography to encrypt files or messages (such as PGP) and the risks and benefits for transport-layer security applications, where the files and messages may not be encrypted, but the data stream can be (such as an IPsec VPN or FTPS). Does your recommended method fall under either of the two categories? Why or why not?

Reference no: EM131220685

Questions Cloud

How events affects the amount of m1 that people hold : Explain how each of these events affects the amount of M1 that people hold: - ATMs are invented. - Credit cards are invented.
How many times does it produce any square that it produces : Assume we plan to use k Reduce tasks. For each of your joins from (a), into how many buckets should you hash each of W, X, Y , and Z in order to minimize the communication cost?
Identify and summarize the purpose of your interview : Identify and summarize the purpose of your interview. How will the information you gather be used? Explain how you will structure the interview and your reasoning behind the structuring of the interview. Include a list of topics you plan to cover.
How much has been swept into an mmda : How much of the money you deposit is actually in the account on a typical day, and how much has been swept into an MMDA?
Benefits for transport-layer security applications : Next, explain the risks and benefits of applications that use Public Key Cryptography to encrypt files or messages (such as PGP) and the risks and benefits for transport-layer security applications, where the files and messages may not be encrypted, ..
What differences or similarity did you see with both solids : What differences/similarities did you see with both solids? Explain the importance of taking the mass of each individual substance involved in a system. Explain the importance of units for each variable involved in Gibbs Free Energy equation.
How does given change the series of transactions : Recall the transactions that are triggered when you pay your rent. - How does this change the series of transactions?
Distinguish between mobile subscriber : Distinguish between mobile subscriber, ISDN number and mobile station roaming?
Identify an element of the hernandez family case : Identify an element of the Hernandez family's case that may influence the way Juan and Elena Hernandez address their issue with the social worker. Explain how the genogram you created might help you address the needs of the Hernandez family.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Emerging trends in information technology

Assignment: One of the emerging trends in information technology is the rise in the number and type of certifications available to IT professionals. Find at least five certifications targeted at IT professionals and write a 3- to 4-page paper that..

  Calculate a person''s net pay after subtracting income

Write a program to calculate a person's net pay after subtracting federal income tax. The program should ask the user to enter the person's name, social security number, gross pay, and the number of dependents. The program should first de- termine..

  Write a fragment of code

Write a fragment of code that will read words from the keyboard until the word done is entered. For each word except done, report whether its first character is equal to its last character. For the required loop, usea a.While statment b. do-while ..

  Paper about the inheritance structures of galaga.

Identify the parent and child classes and describe what each class has for events and data. If you are unfamiliar with Galaga, do a web search on the topic to find some resources.

  Solve equations and show that no solution exists

Solve the following equations for x and y or show that no solution exists. Show your work (in particular, what division must you carry out to solve each case). (i) 5x + 23  6 mod 47

  How you will enforce minimum cardinality

Design a database for your model in Project Question 5.65(d). Your design should include a specification of tables and attributes as well as primary, candidate, and foreign keys.

  Privacy protection act and forensic computer science

Research a scholarly paper in two paragraphs summaries. First paragraph is a summary of the article and the second paragraph is a reaction or discussion to the article. - Must be in APA formatTopic 1: Privacy Protection Act,

  What is the speedup obtained from fast mode

A) What is the speedup obtained from fast mode? B) What percentage of the original execution time has been converted to fast mode? Or what is the Fractionenhanced?

  What is middleware

What are fat clients and thin clients, and what are the differences in philosophy of the two approaches?

  How can build 32bits shift left logical or shift right

how can i build 32bits shift left logical or shift right arithmetic with logisim?

  Stack object data structures do not contain code

Stack object data structures do not contain code to throw an exception when a stack.pop() function is called on an empty stack. This is due to the fact that it is easy to establish this exception handing elsewhere. Create a class named SafeStack that..

  Explaining sites appropriate for mobile devices

What do you think are some of the types of sites that would be appropriate for mobile devices? What types of sites do you think are inappropriate?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd