Listing the pros and cons of each solution

Assignment Help Computer Network Security
Reference no: EM13334226

1. The security firm that employs you has been hired by a new customer. This customer developed in-house, custom application system that archives papers forms in electronic format, complete with a web-based document locator function that works a fallows: users type in keywords in a search engine, related to the document that they are looking for the application returns several possibilities. User can then click on the appropriate document title, and it downloaded from the back-end database and displayed on the user's screen. It is noteworthy that the user not employees of the company in question. This company offers the application as a third party service. All its clients are medical practices that use the application as on offside electronic medical records solution. They are linked to the application via their Internet connection and a regular web browser.

2. After spending a day with the developer's responsible for this application reviewing the code, your first recommendation is that since all the information that is transmitted is in fact a Protected Health information (PHI), all transactions should be encrypted. As it presently stands, the application system is sending all the documents between the database server and the user' desktop via HTTP (i.e., in clear text). Write a couple of paragraphs making a case that first thing that should be done to the application system is to retrofit an encryption solution.

3. It is settled that application will be sending all information via HTTPS, the secure version of HTTP that relies on SSL to guarantee confidentiality. You know that there are two choices to set up https: Either use certificates created in-house. Write a couple of paragraphs on the matter, specifically listing the pros and cons of each solution. Finally, make a recommendation of using one or the other method.

4. One the medical practices than contracted to use this application system, as its EMR solution is located outside of the United States, but still requires 128-bit encryption. Explain a paragraph how that can be an issue. Research U.S. Federal Regulations that govern exporting encryption technology on the Internet for more information on this topic if necessary.

5. Another need than you identified trough the audit than you ran against this application system is that e-mails are being sent between clients a managers. However, the integrity and nonrepudiation of the e-mail sent is not currently guaranteed. Write a paragraph to outline a solution that could be deployed to remedy this issue.

Reference no: EM13334226

Questions Cloud

Describe the common critical mistakes entrepreneurs : Describe the common critical mistakes entrepreneurs make when developing pro-forma financial statements. Also, discuss the impact each of these errors would have on the business if not avoided.
What is the total rate of flow in the pipes : A viscous liquid is flowing steadily through a pipe of diameter D. Suppose you replace it by 7 parallel pipes, what is the total rate of flow in the 7 pipes compared to the original flow rate
Explain why compound fails to react as a diels-alder diene : Explain why this compound fails to react as a diels-alder diene- 2 hexagons joined in middle with a double bond in each
Find the self-inductance of this solenoid : A technician wraps wire around a tube of length 40 cm having a diameter of 7.8 cm. Find the self-inductance of this solenoid
Listing the pros and cons of each solution : Explain a paragraph how that can be an issue. Research U.S. Federal Regulations that govern exporting encryption technology on the Internet for more information on this topic if necessary.
Determine what will be the optimal cash return point : Veggie Burgers, Inc., would like to maintain their cash account at a minimum level of $200,000; but expect the standard deviation in net daily cash flows to be $1,000; the effective annual rate on marketable securities to be 4.7 percent per year
Potential problems in multicultural teams : Potential Problems in Multicultural Teams
Determine the maximum current in the circuit : A sinusoidal voltage ?v = (65 V) sin (130t) is applied to a series RLC circuit with L = 10 mH, C = 120 ?F, and R = 50 ?. What is the maximum current in the circuit
Determine what is the aftertax cost of debt : Mullineaux Corporation has a target capital structure of 65 percent common stock, 10 percent preferred stock, and 25 percent debt. Its cost of equity is 11 percent, the cost of preferred stock is 6 percent

Reviews

Write a Review

Computer Network Security Questions & Answers

  Denote the des encryption of the plain text

Find another key that also has this property, and explain the structure of the DES key schedule that permit such keys to exist.

  Des operating on a general plaintext input

DES operating on a general plaintext input 1st with key K1 and then with key K2 manufactures the same output as if K2 were first used and then K1.

  Explain rsa public-key encryption scheme

Consider the plain (i.e., non-padded) RSA public-key encryption scheme. Encrypt the message m = 12 using the public key pk = (N,e), where N = 35 and e = 3.

  Design the layout of users

The topology diagram for the different servers and locations and trust domains. For example, where is the firewalls, and where are the users located in the topology.

  Basic function / purpose of a firewall

What is the basic function / purpose of a firewall? What are some different firewall implementations (stateful inspection, dual-homed, etc) and how might an organization use firewalls

  Study of asymmetric and symmetric key cryptography

From your study of Asymmetric and symmetric key cryptography, use your own words

  Passive eavesdropper observes single execution of protocol

Show that a passive eavesdropper that observes a single execution of the protocol can recover key s and impersonate the tag.

  How to set up or improve their cybersecurity

How should government justify telling private industry how to set up or improve their cybersecurity?

  Discuss two drawbacks of steganography

Discuss two drawbacks of steganography Describe the operation of a Trojan Horse program. How can we protect our computer from such a program

  Discuss the risks of having a single root user

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems.

  Controls to detect or prevent salami attacks

List three controls that could be applied to detect or prevent salami attacks. Modularity can have a negative as well as a positive effect. A program that is overmodularized performs its operations in very small modules.

  Compute the entry in the rijndaels-box

Compute the entry in the RijndaelS-box

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd