prepare down a 1,400 to 2,100 word paper which describes the security authentication process.
Describe how this and other information security considerations will influence the design and development method for new information systems.
Comprise a brief description of how to comprise preventative measures for securing data, like (however not limited to) backups and remote or redundant storage.
Note what role this will play in the other areas covered in the paper.
Give an overview of some systems and devices which can give security services to meet up the requirements raised by the other areas.