Cryptography Research Paper

Create a fictitious company that has

• Email (both encrypted and not),

• Hash values to verify documents,

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

• Databases that store

• corporate sensitive / proprietary information

• employee payroll, health records, etc.

• vendor information

• credit card information

• other items as determined by the type of company

• Remote users that must be authenticated

• On site users that must be authenticated

You will need to complete the following:

• What methodology will you use to protect the data?

• What are the biggest challenges faced by companies using encryption?

• How will you verify and authenticate the users both local and remote?

• What forms of encryption (symmetric / asymmetric)

• What certifying authorities will you use?

• What are common attacks and how will you protect against them?

• How have other similar companies dealt with this and with what results?

• How will you test the method you choose?

• What are the expected outcomes?

• What new methods may be on the horizon that will help this industry?

Please note the following criteria:

Research paper:

• Research Paper must be in APA Style

• Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)

• Must be at least 10 double-spaced pages with standard 1 inch margins.

• 6 – 8 pages of prose

• Limit the number of bulleted lists

• Prose + charts + figures = 10 pages

• Total report should be 10 – 15 pages

Presentation

This presentation must be supported by the research paper.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
[promo2]