Professional academic articles with 3,000 words each are required which describes the general situation and life in a workplace.
The company/organization/enterprise should be fictional but nevertheless with very specific details which gives a sense of truthfulness in the description and appear as a real valid organization.
The articles should contain security loopholes targeting the components of the Information System (Software, Hardware, Data, People, Procedures, Networks).
The readers mission to find those security weaknesses after reading the full article. It's very important that the security weaknesses are not emphasized on and described generally.
Each article should contain at least three security holes for each of the components in the Information System (3 security holes X 6 IS components = 18 security holes).
The articles should not be copy paste and should not contain plagiarism.
For the article to qualify, you should send a mind map that shows the loop holes, departments, staff, etc that you will describe in your article.
Each delivered article according to the above specs will get 15 $ (No milestone, direct pay after each delivered article).