Reference no: EM133389111
Scenario
For this final project, put yourself in the role of a security analyst who is performing an audit of your company. Your organization is a mid-sized manufacturing company that released its own smart headset. The headset has the ability to project important documents on an optical screen for the technicians in the field. The documents could be product schematics, invoices, emails, text messages, or any documents put in the shared drive on the server. The headset has constant communication with the server that resides in the central office; the connection is made through the technicians' cell phones via Bluetooth connection.
II. Data Protection Strategy or Technology
Select a data protection strategy or technology and discuss the following critical elements:
A. Describe how the strategy or technology provides protection to an organization.
B. Defend the strategy or technology as a credible solution based on your analysis of the threat model for the scenario.
C. Describe the security risks and rewards associated with the strategy or technology.
D. Describe how cryptographic techniques are used with this data protection strategy or technology to achieve security objectives.
E. Discuss the advantages and disadvantages of the encryption method used in the data protection strategy or technology.
F. Discuss the security concerns related to cryptographic techniques.