What methodology will you use to protect the data


Assignment: Cryptography Research Paper

Create a fictitious company that has

• Email (both encrypted and not),

• Hash values to verify documents,

• Databases that store

• corporate sensitive / proprietary information

• employee payroll, health records, etc.

• vendor information

• credit card information

• other items as determined by the type of company

• Remote users that must be authenticated

• On site users that must be authenticated

You will need to complete the following:

• What methodology will you use to protect the data?

• What are the biggest challenges faced by companies using encryption?

• How will you verify and authenticate the users both local and remote?

• What forms of encryption (symmetric / asymmetric)

• What certifying authorities will you use?

• What are common attacks and how will you protect against them?

• How have other similar companies dealt with this and with what results?

• How will you test the method you choose?

• What are the expected outcomes?

• What new methods may be on the horizon that will help this industry?

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: What methodology will you use to protect the data
Reference No:- TGS03020619

Now Priced at $120 (50% Discount)

Recommended (97%)

Rated (4.9/5)