Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Description: Create a fictitious company that has • Email (both encrypted and not), • Hash values to verify documents, • Databases that storeo corporate sensitive / proprietary informationo employee

Description:

Create a fictitious company that has

• Email (both encrypted and not), • Hash values to verify documents, • Databases that storeo corporate sensitive / proprietary informationo employee payroll, health records, etc.o vendor informationo credit card informationo other items as determined by the type of company• Remote users that must be authenticated• On site users that must be authenticated

You will need to complete the following:​

• What methodology will you use to protect the data?• What are the biggest challenges faced by companies using encryption?• How will you verify and authenticate the users both local and remote?• What forms of encryption (symmetric / asymmetric)• What certifying authorities will you use? • What are common attacks and how will you protect against them?• How have other similar companies dealt with this and with what results?• How will you test the method you choose?• What are the expected outcomes?• What new methods may be on the horizon that will help this industry?

Please note the following criteria:

Research paper:

• Research Paper must be in APA Style• Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)• Must be at least 10 double-spaced pages with standard 1 inch margins.• 6 – 8 pages of prose• Limit the number of bulleted lists• Prose + charts + figures = 10 pages

• Total report should be 10 – 15 pages• 

Presentation:

This presentation must be supported by the research paper. 

Presentation will be based on the following:

Completeness of the Topic  

Presentation Delivery 

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question