Overarching Final Paper Scenario: You have been asked by your Executive Leadership to develop a Mobile Device and Application Security Strategy &

Overarching Final Paper Scenario:

You have been asked by your Executive Leadership to develop a Mobile Device and Application Security Strategy & Implementation Proposal to include mobile device roll out for 100% adoption. This is a significant increase as only middle management and above were allowed enterprise issues mobile devices (e.g. smartphones and tablets). The increase is from 25% mobile devices provided to the targeted 100% adoption over the next 2-3 years. Additionally, the Organization is looking to launch 1-5 new mobile applications on both iOS and Android platforms supporting its mission. The organization has never developed mobile applications before, and will be looking to incorporate functionality, ease of use, security, and privacy in any new applications they rollout. The mobile apps will vary from business-to-business and business-to-consumer, and is intent on distribution through the official mobile applications stores (e.g. Apple App Store and Google Play Store). Your final paper should address your assigned sector, where you can define the business case using the above parameters. Your final paper should cover, your business base, top threats or risks you are concerned with, your security approach to address the risks, your cost estimates, and your proposed strategy or plan.

The body of the paper (15-20 pages) should link Short Paper 1, 2, 3, and 4 to support overall development and delivery of a Mobile Device and Application Security Strategy/Implementation Plan.

Briefing with slides. Each individual will present their briefing to leadership on voice over PowerPoint (no more than 30 minutes; 5-10 slides) or video with PowerPoint. Video briefing in class. Please schedule with the Instructor.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

  The first Administrative Safeguard in the Security Rule Standards is the Security Management Process standard.  The Security Management Process

  The first Administrative Safeguard in the Security Rule Standards is the Security Management Process standard.  The Security Management Process standard has four required implementation specifications.  Two of these are Risk Analysis and Risk Management.   Risk Analysis and Risk Management are the foundation upon which an entity’s necessary security activities are built.  Security Risk

Chapter 7( find in the attachement) Data collection is a fundamental aspect of quantitative research, and this chapter provides valuable insights into

Chapter 7( find in the attachement) Data collection is a fundamental aspect of quantitative research, and this chapter provides valuable insights into different approaches for gathering data. Discuss the pros and cons of various data collection methods, such as in-person collection, computer-assisted telephone interviewing (CATI), and virtual data collection via online

THERAPY FOR CLIENTS WITH PERSONALITY DISORDERS Individuals with personality disorders often find it difficult to overcome the enduring patterns of

THERAPY FOR CLIENTS WITH PERSONALITY DISORDERS Individuals with personality disorders often find it difficult to overcome the enduring patterns of thought and behavior that they have thus far experienced and functioned with in daily life. Even when patients are aware that personality-related issues are causing significant distress and functional impairment

Chapter 14 (Find the attached) The culmination of research endeavors often involves presenting your findings to an audience, whether in conferences or

Chapter 14 (Find the attached) The culmination of research endeavors often involves presenting your findings to an audience, whether in conferences or through peer-reviewed journal publications. This chapter touches upon the essential skills and strategies needed to effectively communicate your research to the scientific community.  What are the key principles and