📘 Uncategorized

There are two parts to this assignment. In Part 1, you will analyze the cybersecurity risks related to implementing BYOD into an organization

AD admin3 · 📅 5 August 2024 · ⏱ 2 min read
✍️ Need help with this assignment? Get expert quotes in minutes — free to submit. ✍️ Get Writing Help FREE

There are two parts to this assignment. In Part 1, you will analyze the cybersecurity risks related to implementing BYOD into an organization. You will examine this with regard to legal implications, personal use and personal data, sensors, location services, always-connected, mobile device management, and multifactor authentication. In Part 2, you will write an outline for a presentation that you will give to a professional conference on Cybersecurity in the field in which you work. You will discuss who you intend to network with professionally and will evaluate how you can use the conference and the people you meet to advance your career.

Assignment Instructions

Part 1

  1. You are a cyber security analyst for a large healthcare clinic. You understand the cyber risks that exist when using cloud-based and mobile applications. The top executive of the organization wants to introduce BYOD for the employees.
  2. The CIO has asked you to prepare a report that thoroughly analyzes the threats and risks of BYOD to the organization.
  3. Be sure to discuss all of the following (create a section for each topic):
    • legal agreements for data protection
    • personal use and personal data
    • sensors
    • location awareness
    • always-on always connected
    • multifactor authentication
    • mobile device management
  4. Make a recommendation to the CIO as to whether or not you think that BYOD should be introduced to the organization. Provide an analysis of both the pros and cons and then your final recommendation.
  5. Be sure the paper has an introduction, conclusion, in-text citations, and reference list.

Part 2

  1. Write an outline for a presentation you might give regarding advanced persistent threats (APT) or newly emerging strains of malware to a professional conference in the field in which you work.
  2. Describe the APT or malware strain.
  3. Discuss the implications of this type of threat for the industry in which you work.
  4. Describe the types of people that you will want to network with at this conference and describe why.
  5. Describe how you can use this conference to further advance your career.

Assignment Requirements

Combine Part 1 and Part 2 into a single Word document

The Part 1 section should be at least 5?6 pages, use 12 pt. Times New Roman, and be in APA format.

The Part 2 section (outline and discussion) should be 1 page, use 12 pt. Times New Roman.

The post There are two parts to this assignment. In Part 1, you will analyze the cybersecurity risks related to implementing BYOD into an organization first appeared on Scholarly Guider.

Plagiarism Free Assignment Help

Expert Help With This Assignment — On Your Terms

  • Native UK, USA & Australia writers
  • 100% Plagiarism-Free — Turnitin report included
  • Deadline from 3 hours
  • Unlimited free revisions
  • Free to submit — compare quotes
AD
admin3
Academic Expert · NursingExpert

Expert academic writer and education specialist helping students in the UK, USA, and Australia achieve their best results.

Need help with your own assignment?

Our expert writers can help you apply everything you've just read — to your actual assignment, brief, and marking criteria.

Get Expert Help Now →
📝 Free Submission — No Card Required

Need Help With This Assignment?

Our verified experts deliver 100% original, plagiarism-free work to your exact brief and marking criteria. Submit free — compare quotes — choose your expert.

Write My Assignment FREE Get A Free Quote →

No credit card · No commitment · First quote in minutes