Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Project Outline 1 2 3 4 Description: Conduct a thorough literature review to analyze the security threats related to latest trend of using debit and
Project Outline 1 2 3 4 Description: Conduct a thorough literature review to analyze the security threats related to latest trend of using debit and credit cards over WIFI technology in Point-Of-Sales (POS) machines in Bahrain. Perform the desired tasks on any existing system to overcome underlying security problems. The solution must cover the protection at hardware, network, application, and data from cybersecurity threats. Perform the following tasks to accomplish your project goals. 5 6 Development Steps Report Structure: Abstract theoretical background Modern POS technologies Identify security gap analysis Project Objectives System Architecture Analyze the current cyber threats approach for combating cyber-attacks through proactive security measures. Proposed logical security Design the proposed range framework of methods to develop cybersecurity system components System Evaluation Evaluate the proposed security system effectiveness and efficiency using grounded theory. Findings and discussion Conclusion and Summing up with your References points and a statement of opinion/decisions reached. 7 8 1. Provide a factual description of the current POS system in focus. 2. Identify cybersecurity issues related to POS users/customers. 3. Select best approaches to solve key cyber threats in this case. 4. Propose and Model an improved security system architecture to mitigate underlying cybersecurity threats. 5. Evaluate the proposed system quality and efficiency in securing the information systems 9 The following rubric highlights the contents expected in your report. Project Outline 1 2 3 4 Description: Conduct a thorough literature review to analyze the security threats related to latest trend of using debit and credit cards over WIFI technology in Point-Of-Sales (POS) machines in Bahrain. Perform the desired tasks on any existing system to overcome underlying security problems. The solution must cover the protection at hardware, network, application, and data from cybersecurity threats. Perform the following tasks to accomplish your project goals. 5 6 Development Steps Report Structure: Abstract theoretical background Modern POS technologies Identify security gap analysis Project Objectives System Architecture Analyze the current cyber threats approach for combating cyber-attacks through proactive security measures. Proposed logical security Design the proposed range framework of methods to develop cybersecurity system components System Evaluation Evaluate the proposed security system effectiveness and efficiency using grounded theory. Findings and discussion Conclusion and Summing up with your References points and a statement of opinion/decisions reached. 7 8 1. Provide a factual description of the current POS system in focus. 2. Identify cybersecurity issues related to POS users/customers. 3. Select best approaches to solve key cyber threats in this case. 4. Propose and Model an improved security system architecture to mitigate underlying cybersecurity threats. 5. Evaluate the proposed system quality and efficiency in securing the information systems 9 The following rubric highlights the contents expected in your report
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started