NPU Fictitious Company Latest attacks on Encryption Case Research Paper
NPU Fictitious Company Latest attacks on Encryption Case Research Paper
Description:
Create a fictitious company that uses
- Email (both encrypted and not),
- Hash values to verify documents,
- Databases that store
- corporate sensitive / proprietary information
- employee payroll, health records, etc.
- vendor information
- credit card information
- other items as determined by the type of company
You will need to complete the following:
- What methodology will you use to protect the data?
- What are the biggest challenges faced by companies using encryption?
- What are common attacks and how will you protect against them?
- How have other similar companies dealt with this and with what results?
- How will you test the method you choose?
- What are the expected outcomes?
- What new methods may be on the horizon that will help this industry?
- 6 – 8 pages of prose
- Limit the number of bulleted lists
- Prose + charts + figures = 10 pages
Please note the following criteria:
Research paper:
- Research Paper must be in APA Style
- Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)
- Must be at least 10 double-spaced pages with standard 1 inch margins.
- Total report should be 10 – 15 pages
- Paper will be 200 points:
Presentation
This presentation must be supported by the research paper.
Presentation will be 100 points and based on the following:
Completeness of the Topic
Presentation Delivery
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..


