This is only example
Create a fictitious company that uses
· Email (both encrypted and not),
· Hash values to verify documents,
· Databases that store
o corporate sensitive / proprietary information
o employee payroll, health records, etc.
o vendor information
o credit card information
o other items as determined by the type of company
These are main topics
You will need to complete the following:
· What methodology will you use to protect the data?
· What are the biggest challenges faced by companies using encryption?
· What are common attacks and how will you protect against them?
· How have other similar companies dealt with this and with what results?
· How will you test the method you choose?
· What are the expected outcomes?
· What new methods may be on the horizon that will help this industry?
Please note the following criteria:
Research paper: Research Paper must be in APA Style Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference) Must be at least 10 double-spaced pages with standard 1 inch margins.
6 8 pages of prose
Limit the number of bulleted lists
Prose + charts + figures = 10 pages Total report should be 13 pages