Crypto Systems and Data Protection PMA (First Sit)

1 ContextYou are a system architect in a large cyber security consultancy. You have been asked to propose a solution to meet the requirements of a new client. The client is a UK University. The client uses an ID card-based authentication system to enable access to...