+1(978)310-4246 credencewriters@gmail.com

TopicBegin thinking of mobile device security in a business situation. Select a fictional or real corporate or university environment that requires mobile access. Use the Q & A Forum to ask questions and discuss your ideas about the project.ProposalCourse Project Proposal (one to two pages, 35 points). Remember to properly cite any external sources used.The proposal should contain the following items.Cover pageSubject of the Course ProjectName of the company or organizationBrief description of the company chosenValue proposition of the companySize of the workforce (students included if the company chosen is an academic institution) with respect to IT infrastructure needsOverview of the different types of mobile networks available in the companyOverview of types of mobile devices and storage media used in the companyIdentification of potential mobile security risksAudience to whom you are presenting the recommendation(s)ReferencesTechnical Report (four to five pages, 65 points). Remember to properly cite any external sources used. The technical report should contain the following items.Cover pageIntroductionIntentional versus unintentional mobility scenarios in the companyProtection of dataPhysical protection mechanismsLogical protection mechanismsProtecting heterogeneous informationProtecting data in motionData protection modelsUsing a device-centric or data-centric model for the case study; which one is better?EncryptionTypes of encryption employed by the company’s IT departmentDefense or countermeasuresAuditingDeterrent controlsPreventive controlsPortable computer controlsSmartphones and PDAsE-mail protectionConclusionReferences

error: Content is protected !!