Description:
Create a fictitious Health Care company that uses
· Email (both encrypted and not),
· Hash values to verify documents,
· Databases that store
o corporate sensitive / proprietary information
o employee payroll, health records, etc.
o vendor information
o credit card information
o other items as determined by the type of company
You will need to complete the following:
· What methodology will you use to protect the data?
· What are the biggest challenges faced by companies using encryption?
· What are common attacks and how will you protect against them?
· How have other similar companies dealt with this and with what results?
· How will you test the method you choose?
· What are the expected outcomes?
· What new methods may be on the horizon that will help this industry?
Please note the following criteria:
Research paper:
- Research Paper must be in APA Style
- Research Paper must have at least 5 works cited of which 2 must be peer-reviewed works/articles (note your book can be included as a reference)
- Must be at least 10 double-spaced pages with standard 1-inch margins.
• 6 – 8 pages of prose
• Limit the number of bulleted lists
• Prose + charts + figures = 10 pages
- The total report should be 13 pages