Entrepreneurs is starting a new data storage

Assignment Help Basic Computer Science
Reference no: EM13714437

QII.1 For a public-key encryption system, list reasons,
1) in favor of
2) and against
for using the same key pair for the encryption and the digital signature


QII.2 Describe "inference controls"
Give reasons why they are needed.
And give specific examples (at least 3), and
Describe how the inference controls are implemented; how they serve the purpose (effective) in a database.

QII.3 Describe the "crypto dilemma."
Suggest 3 ways to address the "crypto dilemma."
State the pros and cons of each way.

Part 3: Essay Question. Maximum length: 900 words, ( weight 20 pts.)

An enterprising group of entrepreneurs is starting a new data storage and retrieval business, SecureStore, Inc. For a fee, the new company will accept digitalized data (text and images, multimedia), and store it on hard drives until needed by the customer. Customer data will be transmitted to and from SecureStore over the Internet. SecureStore guarantees that the confidentiality and integrity of the data will be maintained.

SecureStore also envisions certain information assurance requirements for their internal operations. Company employees will need to exchange confidential email, and will need a mechanism for verifying the integrity and originator of some email messages. Also, SecureStore intends a daily backup of all customer data to a remote facility via a leased line. They wish to do so as economically as possible, while ensuring the data's confidentiality and integrity.

SecureStore is interviewing candidates for the position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy SecureStore's requirements as stated above. How would a successful candidate respond?

First, distill the requirements from the above statements; once you have them then please address each requirement in a separate paragraph. Keep in mind that this business will be operating in the real world, which means please pay attention to economics. If you are unsure about the requirements, send them to me, I will comment on it.

Reference no: EM13714437

Questions Cloud

The three most important deliverables in scope definition : What are the three most important deliverables in scope definition? What are some benefits and potential problems in using an abrupt cut-over conversion and in using a parallel conversion strategy?
Wireless local area network : Internet Intranet (local area network, wide area network, and metropolitan area network) Extranet (interactive voice response, automatic call distributor, call routing, and dialer) Wireless local area network (LAN)
Declare and instantiate a two-dimensional int array : 1. Declare and instantiate a two-dimensional int array called temperatures which contains four rows (corresponding to weeks) and seven columns (corresponding to days) with the initial values 73, 71, 68, 69, 75, 77, and 78 in the first row, 76, ..
Several telephony technologies currently available : 2. Based on your research, write an 6-8 page paper that researches the concept of internet telephony, as well as providing an analysis and comparison of several telephony technologies currently available.
Entrepreneurs is starting a new data storage : An enterprising group of entrepreneurs is starting a new data storage and retrieval business, SecureStore, Inc. For a fee, the new company will accept digitalized data (text and images, multimedia), and store it on hard drives until needed by t..
Heat engine is powering a carnot cycle refrigerator : For a Carnot cycle, with water as the operating fluid, the following steps are known to occur. The water changes from saturated liquid to saturated vapor at 200°C as heat is added. Heat is rejected at constant pressure at 20 kPa.
Create a new table for suppliers contact information : 1. Create a new table for Suppliers' contact information and set the primary key and appropriate data types for the fields. The table should at least contain the following information: a. Company name and address  b. Representative's name, pho..
What is the mass flow rate of air-heat exchanger : A compressor receives 0.1 kg/s R-134a at 150 kPa, -10C and delivers it at 1000 kPa, 40C. The power input is measured to be 3 kW. The compressor has heat transfer to air at 100 kPa coming in at 20C and leaving at 30C (i.e. like a heat exchanger). What..
What is a typical pearlite structure : Using the iron-Carbon equilibrium phase diagram, please describe the lines of transformation to austenite during heating with carbon content

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Use java 5 to create a generic class drawingbox with a type

Use Java 5 to create a generic class DrawingBox with a type parameter that simulates drawing an item at random out of a box. This class could be used for simulating a random drawing.

  What is the copy constructor for a weighted digraph in c++

What is the copy constructor for a weighted digraph in c++?

  Explain the key factors of workbook design

The task of designing a very important workbook that will contain very important data to be reviewed by very important people over and over again. Explain the key factors of workbook design you should consider in accomplishing this task.

  Which of these two versions do you prefer and why

Redraw the ERD for this new situation using two entity types, and the redraw it again using one entity type. Which of these two versions do you prefer and why?

  What is the q complexity of the sum

What is the Q complexity of the sum? Please give a detailed answer so that I may learn from it. Thank you!

  Generate gaussian random numbers

Generate Gaussian Random Numbers and adapt the sample program found there (obey copyright).

  What is impact of diploma mills on legitimate educational

1) What is the impact of diploma mills on legitimate educational institutions? How does one check the credentials of learning institutions to verify legitimacy? What should one look for when selecting an institution of higher learning?

  Modularization

Modularization

  The mode of a list of values is the score

For this project you will write a program to compute the arithmetic mean (average), median, and mode for the values read in from TopicFin.txt. The program results will be written to TopicFout.txt.

  Application of artificial intelligence what are application

what are application of artificial intelligence in different fields and also explain it? ltbrgtwhat are application of

  Perform a computer forensic investigation

Is it easier to perform a computer forensic investigation if the suspect's computer is a Linux or UNIX system instead of Windows? Does the type of operating system affect the process at all? Consider all flavors of Linux/UNIX and Windows.

  Identify hosts within the network

Identify hosts within the network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd