Please read the Overview and Requirements
Please address comments in the attached.
Overall paper needs to read better, clarity.
Need to be shorten to 10-pages.
Must have in paper…..Definition of terms listed in Steps 3 & 6. In the threat table, show what threats could exploit each listed component and the likelihood of that occurring in your organization. It is important to define and understand key concepts such as steganography, encryption, and PKI.