NEED A PERFECT PAPER? PLACE YOUR FIRST ORDER AND SAVE 15% USING COUPON:

Cryptography Research Paper

Create a fictitious company that has 

• Email (both encrypted and not), 

• Hash values to verify documents, 

• Databases that store

• corporate sensitive / proprietary information

• employee payroll, health records, etc.

• vendor information

• credit card information

• other items as determined by the type of company

• Remote users that must be authenticated

• On site users that must be authenticated

You will need to complete the following:

• What methodology will you use to protect the data?

• What are the biggest challenges faced by companies using encryption?

• How will you verify and authenticate the users both local and remote?

• What forms of encryption (symmetric / asymmetric)

• What certifying authorities will you use? 

• What are common attacks and how will you protect against them?

• How have other similar companies dealt with this and with what results?

• How will you test the method you choose?

• What are the expected outcomes?

• What new methods may be on the horizon that will help this industry?

Please note the following criteria:

Research paper:

• Research Paper must be in APA Style

• Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)

• Must be at least 10  double-spaced pages with standard 1 inch margins.

• 6 – 8 pages of prose

• Limit the number of bulleted lists

• Prose + charts + figures = 10 pages

• Total report should be 10 – 15 pages

Presentation

This presentation must be supported by the research paper. 

Looking for this or a Similar Assignment? Click below to Place your Order