How could the contracts manager further secure this file

Assignment Help Basic Computer Science
Reference no: EM132136867

The contracts manager at a company needs to make a large legal document available to an overseas customer. However, she has some challenges: The document contains sensitive information; it is too large to send via e-mail, and the manager is expecting an amended document in return. The contracts manager must make the document available in an electronic format to only herself and the customer. First, the contracts manager sets up an FTP account that requires usernames and passwords. She gives these usernames and passwords to the customer and instructs him not to divulge the account information to anyone. She reveals authentication information to the customer only across a secure channel (or in person). Next, the contracts manager sets up a folder on the company FTP site into which she can upload the sensitive document. She ensures that only users with specific permissions can access the folder. The contracts manager now gives the customer permissions to upload and download files to and from this folder.

How could the contracts manager further secure this file? Could she use S/FTP to secure the file? Could she use FTPS? Consider some of the other Internet services discussed in this lesson. Which ones would be inappropriate for transmitting this file? Why?

Reference no: EM132136867

Questions Cloud

Which steps already performed by mary kate are part : Which steps already performed by Mary Kate are part of the initiating phase for this project? Which steps are part of the planning phase?
Understanding currency crisis-argentine economic crisis : While fiscal policy is never far from the mind of your average Argentine, Identify two core factors that caused the Argentine economic crisis.
Returns the dot product of a and b : Need help with a Java program that takes two arrays a and b of length 5 storing int values, and returns the dot product of a and b.
Find the fixed and variable cost : Suppose that the cost function is given by: C(g) 100 5g2. Find the fixed and variable cost. Find the marginal cost.
How could the contracts manager further secure this file : How could the contracts manager further secure this file? Could she use S/FTP to secure the file? Could she use FTPS?
Develop a good rapport with police chief rodney hurt : CRJ 105 - Write a report for the Chief of Police Rodney Hurt. He will use the report for his news conference in regard to the public's concern.
What advantages and or disadvantage does such a system : What advantages and or disadvantage does such a system have compared to camera-based systems?
What the consumer could do to increase their utility : Suppose a consumer is consuming a bundle of goods X and Y which lies on their budget constraint. If the indifference curve which runs through this bundle.
Why is it important to back up the dhcp database : Why is it important to back up the DHCP database and Identify key files that make up the DHCP database?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compute the average temperature for a month averaged

Complete the following program that has an array to store one month of hourly templerature readings. Assume each month is 30 days long. Rows represent days of the month and columns represent hours of the day.

  Format the percentage column to percent with no decimal

Format the Percentage column to Percent with no decimal places

  Describe cloud computing

1. Describe Cloud Computing 2. What are the benefits of Cloud Computing? 3. Check out Microsoft's OneDrive? If you were a small business owner, would you consider using OneDrive? Why, or why not?

  Designing an application server

Designing an Application Server

  What is the average magnitude of the force on the ball

A force in the negative direction of an x axis is applied for 27 ms to a 0.24 kg ball initially moving at 16 m/s in the positive direction of the axis. The force varies in magnitude, and the impulse has magnitude 45.1 N s.

  Why do the results in parts c and e seem contradictory

Why do the results in parts c and e seem contradictory? If we want to see if there is a gender gap among voters with respect to this candidate, which is the correct approach? Why?

  Risk assessment should cover personnel

Risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems and networks, and antivirus protection.

  Appropriate element of the array

Your program should convert the integer value given by the user into an int array storing each digit of the number in the appropriate element of the array.

  Standard deviation of invoice amounts

The mean amount µ for all the invoices for your company last month is not known. Based on your past experience, you are willing to assume

  Benefits and drawbacks of using software

Explain the benefits and drawbacks of using software development tools provided by cloud vendors to develop cloud-based solutions for an organization.

  Data output for the validate employee elementary process

Primitive Diagram for the Check-Out Equipment Event Structured English (pseudocode) for the Check Equipment Event Validate Employee elementary processes Data Structure Design (see figure 9-10) for data input and data output for the Validate Employ..

  Describe babbages contribution to the history of computers

Leibniz made a improvement on the machine in Exercise 1. What was the improvement? Describe Babbage's contribution to the history of computers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd