University of The Cumberlands Handling Information Security in A Company Presentation

Question Description

Description:

Create a fictitious company that has

– Email (both encrypted and not),

– Hash values to verify documents,

– Databases that store

– corporate sensitive / proprietary information

– employee payroll, health records, etc.

– vendor information

– credit card information

– other items as determined by the type of company

– Remote users that must be authenticated

– On site users that must be authenticated

You will need to complete the following:

– What methodology will you use to protect the data?

– What are the biggest challenges faced by companies using encryption?

– How will you verify and authenticate the users both local and remote?

– What forms of encryption (symmetric / asymmetric)

– What certifying authorities will you use?

– What are common attacks and how will you protect against them?

– How have other similar companies dealt with this and with what results?

– How will you test the method you choose?

– What are the expected outcomes?

– What new methods may be on the horizon that will help this industry?

Please note the following criteria:

Research paper:

  • Research Paper must be in APA Style
  • Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note that a book can be included as a reference)
  • Must be at least 10 double-spaced pages with standard 1-inch margins.

•6 – 8 pages of prose

•Limit the number of bulleted lists

•Prose + charts + figures = 10 pages

  • Total report should be 10 – 15 pages

Paper will be 200 points:


Presentation:

This presentation must be supported by the research paper.

Presentation will be 200 points.

Prof. Angela

4.6/5

Calculate Price


Price (USD)
$
Need Help? Reach us here via Whatsapp.