Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Project Outline 1 2 3 4 Description: Conduct a thorough literature review to analyze the security threats related to latest trend of using debit and

image text in transcribed

Project Outline 1 2 3 4 Description: Conduct a thorough literature review to analyze the security threats related to latest trend of using debit and credit cards over WIFI technology in Point-Of-Sales (POS) machines in Bahrain. Perform the desired tasks on any existing system to overcome underlying security problems. The solution must cover the protection at hardware, network, application, and data from cybersecurity threats. Perform the following tasks to accomplish your project goals. 5 6 Development Steps Report Structure: Abstract theoretical background Modern POS technologies Identify security gap analysis Project Objectives System Architecture Analyze the current cyber threats approach for combating cyber-attacks through proactive security measures. Proposed logical security Design the proposed range framework of methods to develop cybersecurity system components System Evaluation Evaluate the proposed security system effectiveness and efficiency using grounded theory. Findings and discussion Conclusion and Summing up with your References points and a statement of opinion/decisions reached. 7 8 1. Provide a factual description of the current POS system in focus. 2. Identify cybersecurity issues related to POS users/customers. 3. Select best approaches to solve key cyber threats in this case. 4. Propose and Model an improved security system architecture to mitigate underlying cybersecurity threats. 5. Evaluate the proposed system quality and efficiency in securing the information systems 9 The following rubric highlights the contents expected in your report. Project Outline 1 2 3 4 Description: Conduct a thorough literature review to analyze the security threats related to latest trend of using debit and credit cards over WIFI technology in Point-Of-Sales (POS) machines in Bahrain. Perform the desired tasks on any existing system to overcome underlying security problems. The solution must cover the protection at hardware, network, application, and data from cybersecurity threats. Perform the following tasks to accomplish your project goals. 5 6 Development Steps Report Structure: Abstract theoretical background Modern POS technologies Identify security gap analysis Project Objectives System Architecture Analyze the current cyber threats approach for combating cyber-attacks through proactive security measures. Proposed logical security Design the proposed range framework of methods to develop cybersecurity system components System Evaluation Evaluate the proposed security system effectiveness and efficiency using grounded theory. Findings and discussion Conclusion and Summing up with your References points and a statement of opinion/decisions reached. 7 8 1. Provide a factual description of the current POS system in focus. 2. Identify cybersecurity issues related to POS users/customers. 3. Select best approaches to solve key cyber threats in this case. 4. Propose and Model an improved security system architecture to mitigate underlying cybersecurity threats. 5. Evaluate the proposed system quality and efficiency in securing the information systems 9 The following rubric highlights the contents expected in your report

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Audit Committee Essentials

Authors: Curtis C. Verschoor

1st Edition

0471699594, 978-0471699590

More Books

Students also viewed these Accounting questions

Question

What is a fixed exchange rate and how is its value fixed?

Answered: 1 week ago

Question

Evaluate the importance of the employee handbook.

Answered: 1 week ago

Question

Discuss the steps in the progressive discipline approach.

Answered: 1 week ago