Write a 1,400- to 2,100-word paper
that describes the Security Authentication Process.
Discuss how this and other information
security considerations will affect the design and development process for new information systems.
Include a brief discussion of how to
include preventative measures for securing data, such as (but not limited to) backups and remote or redundant storage.