Conduct scholarly research pertaining to access control and then write a paper to: Evaluate the ineffectiveness of passwords if not properly constructed.

Conduct scholarly research pertaining to access control and then write a paper to:
Evaluate the ineffectiveness of passwords if not properly constructed.
Identify the dangers that exist as a result of improperly implementing passwords.
Justify the move to more secure access technology cards in order to ensure security.
Evaluate various methods of encryption and their effectiveness.
Recommend access/password policies, encryption algorithms, and general security procedures based on your research.
Support your paper with at least five (5) scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.

You may also like