How could the contracts manager further secure this file

Assignment Help Basic Computer Science
Reference no: EM132134148

The contracts manager at a company needs to make a large legal document available to an overseas customer. However, she has some challenges: The document contains sensitive information; it is too large to send via e-mail, and the manager is expecting an amended document in return. The contracts manager must make the document available in an electronic format to only herself and the customer. First, the contracts manager sets up an FTP account that requires usernames and passwords. She gives these usernames and passwords to the customer and instructs him not to divulge the account information to anyone. She reveals authentication information to the customer only across a secure channel (or in person). Next, the contracts manager sets up a folder on the company FTP site into which she can upload the sensitive document. She ensures that only users with specific permissions can access the folder. The contracts manager now gives the customer permissions to upload and download files to and from this folder.

How could the contracts manager further secure this file? Could she use S/FTP to secure the file? Could she use FTPS? Consider some of the other Internet services discussed in this lesson. Which ones would be inappropriate for transmitting this file? Why?

Reference no: EM132134148

Questions Cloud

Project manager in the it department for a university : Mary Kate is a project manager in the IT department for a university. She has been asked to manage a project to create faculty intranet.
Calculate Holly taxable income and net tax payable : TAXA2000 - INTRODUCATION TO AUSTRALIAN TAX LAWS QUESTIONS - Calculate Holly's taxable income and net tax payable
Help with a java program that takes two arrays : That is, it returns an array c of length n such that c[i]=a[i]*b[i].
Which statement do you think is the most important : Based on your understanding of financial statement analysis, of the three statements (Income Statement, Balance Sheet, Statement of Cash Flows) which statement.
How could the contracts manager further secure this file : Consider some of the other Internet services discussed in this lesson. Which ones would be inappropriate for transmitting this file? Why?
Differentiate the level of market efficiency : Compare and contrast the emerging market you selected against another emerging market on factors such as market liquidity of local debt.
Give two possible explanations in the given issue : A firm has consistently adjusted its allowance account at the end of the fiscal year by adding a fixed percent of the period's sales on account.
Toyota truck with a system of spinning lasers : What advantages and or disadvantage does such a system have compared to camera-based systems?
Why is it important to back up the dhcp database : Why is it important to back up the DHCP database and Identify key files that make up the DHCP database?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd