Topic Begin thinking of mobile device security in a business situation. Select a fictional or real corporate or university environment that requires mobile access. Use the Q & A Forum to ask quest

Ace your studies with our custom writing services! We've got your back for top grades and timely submissions, so you can say goodbye to the stress. Trust us to get you there!


Order a Similar Paper Order a Different Paper

Topic

Begin thinking of mobile device security in a business situation. Select a fictional or real corporate or university environment that requires mobile access. Use the Q & A Forum to ask questions and discuss your ideas about the project.

Proposal

Course Project Proposal (one to two pages, 35 points). Remember to properly cite any external sources used.

The proposal should contain the following items.

  1. Cover page
  2. Subject of the Course Project
  3. Name of the company or organization
  4. Brief description of the company chosen

    • Value proposition of the company
    • Size of the workforce (students included if the company chosen is an academic institution) with respect to IT infrastructure needs
    • Overview of the different types of mobile networks available in the company
    • Overview of types of mobile devices and storage media used in the company
    • Identification of potential mobile security risks
  5. Audience to whom you are presenting the recommendation(s)
  6. References

Technical Report (four to five pages, 65 points). Remember to properly cite any external sources used. The technical report should contain the following items.

  1. Cover page
  2. Introduction
  3. Intentional versus unintentional mobility scenarios in the company
  4. Protection of data
  • Physical protection mechanisms
  • Logical protection mechanisms
  • Protecting heterogeneous information
  • Protecting data in motion
  • Data protection models
  • Using a device-centric or data-centric model for the case study; which one is better?
  • Encryption
  • Types of encryption employed by the company’s IT department
  • Defense or countermeasures
  • Auditing
  • Deterrent controls
  • Preventive controls
  • Portable computer controls
  • Smartphones and PDAs
  • E-mail protection
  • Conclusion
  • References
Writerbay.net

Looking for top-notch essay writing services? We've got you covered! Connect with our writing experts today. Placing your order is easy, taking less than 5 minutes. Click below to get started.


Order a Similar Paper Order a Different Paper