TopicRelated to access control, authentication, or Public Key Infrastructure. Some examples:
- Access control or authentication in the cloud.
- Access control models
- How to implement PKI
- PKI standards
- Tool demo
Requirement (Paper)
- Research the topic (selection Must be approved)
- Review (in detail) your selected project
- History, Background, and Security Importance
- IMPORTANT:
- Document the project research (minimum of 5 references)
- Justify why the issue applies to Cybersecurity
- Justify why this is an important Cybersecurity issue
- List all assumptions
- IMPORTANT:
- Use the APA paper template
- Minimum: 15 pages, Maximum: 20 pages.
- Including the following:
- Font: New Times Roman, 12 pts, full-page illustrations are not counted as a page. I’ll check: subject matter, contents, linkage, exhibits, etc…
- Page 1, Title page: subject title, your name, my name, course number and title.
- Page 2, Abstract
- Page 3, Table of contents page (Not an APA requirement MY Requirement).
- Page 4 to 19, Body pages: double spaced, 15 text pages max.
- Page 20, Reference page. References and quotes will be verified.