Your task is to model a real business threat scenario, identifying any applicable sensitive data.
Consider one state of these data in the business environment (at rest, in use, in transit), and propose and justify appropriate cryptographic controls to help protect these data in this state for this business.
Reasonable assumptions can be made about the business processes.
No plagiarism, I need an expert in computer science assignments.
Please check the marking rubrics.
I also uploaded a short video made by the lecturer.
Also, this is a clarification:
Dear Students,
Following several requests for clarification on the meaning of “processing environment” in the assignment guidance:
“Introduction explaining the business data and the processing environment (at a high level).”
The intention here is for you to describe in general (not very detailed) the business data processing environment, meaning the type of data, general flow or use, media used, and/or other high-level details you feel are important to provide the context for the business data managed in the business scenario you selected.
This is an introduction section to the rest of your paper where you describe a data threat and appropriate cryptographic controls. As such, make sure this section provides the context for the reader.