How does cryptography present a challenge to IT administration and management?
Write a technical report on the challenge indicating risks and ways to mitigate them.
You should choose
One or two academic peer-reviewed papers.
Some ‘local documents’, e.g. whitepapers, leaflets and your journal notes.
The seminars or presentations can be referenced.
You can present, contrast and critique positions or claims. Assume you have an audience of IT
professionals who wish to learn about the topic by proxy, i.e. by reading your report.
You should use the Harvard referencing system. The report should be a maximum of 7 pages not including the cover and an index.
A Paper (70-100)
A paper of this quality displays a mastery of topic related information in the literature and the
contexts in which it is presented. The author has taken ownership of the topic with originalthought that is expressed with a style distinguished by its enthusiasm and focus. Theargument is sound, of value to its audience, and well organized. The author introduces other, possibly contrasting, points-of-view. They use sources, including some from IPExpo 2013,effectively. One is impressed by the author's understanding of the topic and where the subject is going.