Conducting additional research

Assignment Help Basic Computer Science
Reference no: EM131223096

For this Discussion, consider the following scenarios that involve transmitting confidential information: 

  1. A mid-sized company has about 250 employees and needs to transmit employee payroll data to the vendor that manages employee contributions towards their retirement plans.
  2. A hospital sends approximately 25 images daily from patients' scans to a clinic of radiologists. The radiologists read the scans and send reports back to the hospital.
  3. A life insurance company has about 1,500 independent agents all over the country. Every day, the agents file electronic application forms from prospective clients to their assigned corporate offices.

Identify a firm from any one of the above scenarios. Based on your readings and upon conducting additional research, suggest two data transmission methods that your chosen firm could use. Explain the risks associated with each alternative. Which method would you recommend for this firm and why?

Next, explain the risks and benefits of applications that use Public Key Cryptography to encrypt files or messages (such as PGP) and the risks and benefits for transport-layer security applications, where the files and messages may not be encrypted, but the data stream can be (such as an IPsec VPN or FTPS). Does your recommended method fall under either of the two categories? Why or why not?

Reference no: EM131223096

Questions Cloud

Why the strategy for storing check constraint values : Explain why the strategy for storing CHECK constraint values in a separate table is better than implementing them in a table-based constraint. How can this strategy be used to implement the constraint on ARTIST. Nationality?
Would you make the same choices presented in the film : Technological and medical advancements have improved the quality of life for most people around the world. However sometimes science loses objectivity as can be seen in "My Sister's Keeper". What are some of the consequences of scientific advancem..
Create the warm and cold fronts on the weather map : Create the warm and cold fronts on the Weather Map. While this map will not need to be turned in, it will assist you in filling out the information in the data table.
Individual income tax: research question : Thomas Wither submitted his 2016 tax return on time and elected married filing jointly status with his wife, Sarah Wither. Thomas and Sarah did not request an extension for their 2016 tax return. Their tax liability for 2016 was determined to be 110,..
Conducting additional research : Identify a firm from any one of the above scenarios. Based on your readings and upon conducting additional research, suggest two data transmission methods that your chosen firm could use. Explain the risks associated with each alternative. Which m..
Document the requirements for the area application : Define and document the requirements for the Area application. Describe the stakeholders needed to help further define the application. Describe a collaboration plan for working with stakeholders.
Discuss the role of intermediate sanctions as a punishment : In your initial response, discuss the role of intermediate sanctions as a punishment alternative within corrections. Begin your response by defining the concept of intermediate sanctions as it applies to corrections. Provide specific examples of d..
Set to be paid off with equal monthly payments : A $100,000 20-yr loan at 6%/yr nominal rate compounded monthly is set to be paid off with equal monthly payments. Then the borrower decides to make two voluntary payments of $10K @n=6 and $20K @n=11 (in place of the regular monthly payments). How muc..
Difference between complete and differential backups : What is the difference between complete and differential backups? Under what conditions are complete backups preferred? Under what conditions are differential backups preferred?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Evaluate the technology, connectivity

Your company has assigned you the task of evaluating its computer networks. You are to write a memo covering 15 points on which you will evaluate the technology, connectivity, and functioning of the company's computer networks.

  Modify the payroll program

Modify the Payroll Program so that it uses a class to store and retrieve the employee's name, the hourly rate, and the number of hours worked. Use a constructor to initialize the employee information

  Conditional critical regions

Give a solution for readers-writers problem using conditional critical regions.

  Assignment on creating a use case

Refer to the RMO CSMS marketing subsystem shown in Figure 3-11 on page 79-80 of the textbook. Write a two to three (2-3) page paper in which you:

  Computer peripheral devices

Identify and explain key trends that are occurring in computer peripheral devices? How do these trends affect business uses of computers?Discuss important computer hardware developments that you expect to happen in the next 10 years? How will thes..

  Create a column of integers 1 through 30

In the next three columns show how each value is represented using the binary, octal, and hex number systems. Identify when and why each of the each three numbering systems is used ?

  Which of these conditions returns true

Which of these conditions returns true? Check the Java documentation for the inheritance patterns.

  Business and computing knowledge that system analysts

Question 1: In addition to the business and computing knowledge that system analysts should possess, what are the other essential skills that they need to effectively complete their jobs?

  Iphones and headphones are complements

If iPhones and headphones are complements. What would happen to supply and demand in both markets when a new study finds that users of iPhones live happier lives?

  Question regarding the commutative properties

Show that Zmwith addition modulo m, where m ≥ 2 is an integer, satisfies the closure, associative, and commutative properties, 0 is an additive identity, and for every nonzero a ∈Zm, m - a is an inverse of a modulo m.

  Question regarding the functional dependencies

Donation (Donator#, Program#, Date, Amount, Title, Theme, Deadline) The requirements of CPC also indicate that there are the following Functional Dependencies:

  Explain copyright implications for web site development

Study and explain copyright implications associated to Web site development. Write down the minimum of 350 words expalining the implications of copyrights on usage of content on Web site.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd