Get 100% original and custom work, fully tailored to your requirements — perfectly written, plagiarism-free, and ready for final submission.

Security report with recommendations for delivering data security

Cyber Security and Applied Cryptography

Security report with recommendations for delivering data security

Assignment Scenario

Gradgo the Graduate Recruitment Agency in Northampton have considered your responses to their initial Cyber Security queries and have now decided to extend your commission for a comprehensive report in the form of a term (research) paper.
 
You are asked to write a security report in the form of a term paper, in which you propose a suitable “data security” solution for any type of software-based activity you may consider that the Agency would be engaged on as part of their total business operations on the Internet.
In your paper you should describe your chosen area in detail. Describe any identifiable vulnerabilities- conduct a vulnerability test. Explain what you would recommend and consider to be a suitable mitigation solution. Identify and experiment with suitable cryptographic software tools. Explain how you would implement your recommended solution, based on your own findings, to provide data security for the Agency.
Note:
●       You are a Cyber Security professional with expertise in applied Cryptography. Cryptography should be the main basis of your solution and recommendations.
●       You may choose* any online application, or a security technology that might provide data security for online applications.
●       Your paper should be clear, concise, and written in a technical context.
●       You will be expected to present your findings to an audience of other security experts.
●        You may discuss the topic of your choice with your tutor during the assignment support session.
*There are several topics listed below for your reference.
Your assignment tasks in a nutshell.
 
  1. Research, investigate, and evaluate the security implications of an online Application.
Or
Conduct an in-depth analysis of a Security Technology that can provide online Security when deployed.
 
  1. Choose and experiment with suitable cryptographic software tool(s)*,
Or
Develop your own software tool that can implement any form of cryptography,
 
which could potentially be used as part of the provision of data security within the context of your chosen topic.
 
  1. Write a full security report in the form of a 2000-4000 words term paper. Appendices are not considered in the word count.
 
  1. Submit a 10 minute video recording of your paper to include a demonstration of the practical experimentation. **
Research Paper possible topics
 
●       Cyber Security issues*
●       Penetration testing & Ethical Hacking for improved security
●       Practical Cryptographic systems
●       Security Standards,
●       Encryption algorithms, Hash functions with appendix and message recovery models,
●       Authentication Systems,
●       PKI
●       Secure Protocols: IPSec, SSL/TLS
●        Quantum resistant cryptography
●       WiFi technologies
●       Mobile technologies
●       Networking technologies: VPNs
●       E-commerce Security
●       Systems Security- Windows/ Unix/Linux cryptographic schemes

GET 100% ORIGINAL AND CUSTOM WORK IN  £119 WITH NO HIDDEN CHARGES. READY FOR THE FINAL SUBMISSION

Previous Post
Next Post

Leave a Reply

Your email address will not be published. Required fields are marked *

About Company

Breakfast procuring nay end happiness allowance assurance frankness. Met simplicity nor difficulty unreserved allowance assurance who.

Most Recent Posts

  • All Posts
  • Blogs
  • CMI assignment
  • Our Project
    •   Back
    • CIPD Assignment
    • IWFM Assignment
    • Python Assignment
    • MATLAB Assignment
    • NVQs Assignment
    • TAFE Assignment
    • LSPM Assignment
    • HND Assignment
    • TEFL Assignment
    • BTEC Assignment

Category

Tags