Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Description: Create a fictitious company that has · Email (both encrypted and not), · Hash values to verify documents, · Databases that store o corporate sensitive / proprie

Description:

Create a fictitious company that has

·         Email (both encrypted and not),

·         Hash values to verify documents,

·         Databases that store

o    corporate sensitive / proprietary information

o    employee payroll, health records, etc.

o    vendor information

o    credit card information

o    other items as determined by the type of company

·         Remote users that must be authenticated

·         On site users that must be authenticated

You will need to complete the following:     

·         What methodology will you use to protect the data?

·         What are the biggest challenges faced by companies using encryption?

·         How will you verify and authenticate the users both local and remote?

·         What forms of encryption (symmetric / asymmetric)

·         What certifying authorities will you use?

·         What are common attacks and how will you protect against them?

·         How have other similar companies dealt with this and with what results?

·         How will you test the method you choose?

·         What are the expected outcomes?

·         What new methods may be on the horizon that will help this industry?

Please note the following criteria:

Research paper:

  • Research Paper must be in APA Style
  • Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)
  • Must be at least 10  double-spaced pages with standard 1 inch margins.

•       6 – 8 pages of prose

•       Limit the number of bullet ed lists

•       Prose + charts + figures = 10 pages

  • Total report should be 10 – 15 pages

·         

Presentation:

This presentation must be supported by the research paper.

Presentation will be  based on the following:

Completeness of the Topic 

Presentation Delivery

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question