The project proposal is attached and i am looking to continue and complete this project using the following guidelines Technical Report (four to five pages). Remember to properly cite any external

STUCK with your assignment? When is it due? Hire our professional essay experts who are available online 24/7 for an essay paper written to a high standard at a reasonable price.


Order a Similar Paper Order a Different Paper

The project proposal is attached and i am looking to continue and  complete this project using the following guidelines

Technical Report (four to five pages). Remember to properly cite any external sources used. The technical report should contain the following items.

Cover page

Introduction

Intentional versus unintentional mobility scenarios in the company

Protection of data

Physical protection mechanisms

Logical protection mechanisms

Protecting heterogeneous information

Protecting data in motion

Data protection models

Using a device-centric or data-centric model for the case study; which one is better?

Encryption

Types of encryption employed by the company’s IT department

Defense or countermeasures

Auditing

Deterrent controls

Preventive controls

Portable computer controls

Smartphones and PDAs

E-mail protection

Conclusion

References

A quality paper will include a title page, abstract, proper citations using APA style, and a bibliography.

A quality paper will include an introduction based on a well-formed thesis statement. The logical order of the content will be derived from the thesis statement. The content will be properly subdivided into sections derived from the outline. In a quality paper, the conclusion will summarize the previously presented content and will complement the thesis statement from the introduction.

A quality paper will be free of any spelling, punctuation, or grammatical errors. Sentences and paragraphs will be clear, concise, and factually correct.

A quality paper will have significant scope and depth of research to support any statements. Strategic implications will be explained and supported. Relevant illustrations or examples are encouraged. A quality paper will employ use of sound reasoning and logic to reinforce conclusions.

The project proposal is attached and i am looking to continue and complete this project using the following guidelines Technical Report (four to five pages). Remember to properly cite any external
RESOLVE DIGITAL COMPANY COURSE PROJECT PROPOSAL NAME: Derrick Robinson INSTITUTION: DeVry University COURSE NUMBER: Network 411 COURSE TITLE: Information Security And Mobile Devices INSTRUCTOR’S NAME: Professor Nabeel Khan DUE DATE: 09/19/21 RESOLVE DIGITAL COMPANY COURSE PROJECT PROPOSAL The subject The project seeks to assess and analyze the access controls like verification, keycards, and authentications. Name: The company’s name will be Resolve digital which is a real company that seeks to improve, maintains, and optimize SaaS and e-commerce solutions. The company has been operating for over eighteen years. Resolve digital. (2021). The description The Resolve digital company deals with Ecommerce development and consultation services to provide potential clients with high-quality solutions developed to meet the contemporary needs of their business. The company also ensures that clients increase their returns on investment by maintaining and optimizing their sites. Resolve digital. (2021). The company has a current workforce of fifty employees. The Resolve digital company normally uses the XpressEntry as the major network which collects information in real-time using the API and RS2. This information collected includes the client’s information, names, login information, synchronizing log of website activities, the access privileges, employee’s information, etc. Resolve digital. (2021). While the Resolve digital company’s hardware lines include multiplexers, the readers of smart cards, the modules (of output and input), etc. The security risks that Resolve digital company mobile technology is exposed to includes: The compromising of the portable network accessing device. A potential risk normally occurs when after the portable readers read the cards, they are transferred using a wireless connection to the server for verification. However, the connection may be breached, causing authentication of an un-allowed connection. The mobile or portable devices may be lost. The XpressEntry allows access from any geographical location, and visitors may enroll from anywhere. However, when potential users lose their devices or are stolen, potentially malicious access risk occurs. Scull & Hsu (2019). The audience They will include mobile and remote technologists. References Resolve digital. (2021). We build, optimize, and maintain innovative eCommerce & SaaS solutions. From: https://resolve.digital/ Scull, J., & Hsu, H. (2019). The Killer App ThatSaved the Macintosh. IEEE Annals of the History of Computing, 41(3), 42-52. https://ieeexplore.ieee.org/iel7/85/5255174/08721177.pdf?casa_token=13LBRs1E92YAAAAA:eGPFMctWkkarCVraUd4MfVsGDggbKKujsrWqMkreKNKY7_DyYvWVAIOKp842td50Fij0g1lYjLZj

Writerbay.net

Everyone needs a little help with academic work from time to time. Hire the best essay writing professionals working for us today!

Get a 15% discount for your first order


Order a Similar Paper Order a Different Paper