Computer Science Unit 5 Assignment IT 545

 

There are two parts to this assignment. In Part 1, you will analyze the cybersecurity risks related to implementing BYOD into an organization. You will examine this with regard to legal implications, personal use and personal data, sensors, location services, always-connected, mobile device management, and multifactor authentication. In Part 2, you will write an outline for a presentation that you will give to a professional conference on Cybersecurity in the field in which you work. You will discuss who you intend to network with professionally and will evaluate how you can use the conference and the people you meet to advance your career.

Having Trouble Meeting Your Deadline?

Get your assignment on Computer Science Unit 5 Assignment IT 545  completed on time. avoid delay and – ORDER NOW

Assignment Instructions

Part 1

  1. You are a cyber security analyst for a large healthcare clinic. You understand the cyber risks that exist when using cloud-based and mobile applications. The top executive of the organization wants to introduce BYOD for the employees. 
  2. The CIO has asked you to prepare a report that thoroughly analyzes the threats and risks of BYOD to the organization.
  3.  Be sure to discuss all of the following (create a section for each topic): 
    • legal agreements for data protection
    • personal use and personal data
    • sensors
    • location awareness 
    • always-on always connected
    • multifactor authentication
    • mobile device management 
  4. Make a recommendation to the CIO as to whether or not you think that BYOD should be introduced to the organization. Provide an analysis of both the pros and cons and then your final recommendation.
  5. Be sure the paper has an introduction, conclusion, in-text citations, and reference list.

Part 2

  1. Write an outline for a presentation you might give regarding advanced persistent threats (APT) or newly emerging strains of malware to a professional conference in the field in which you work.
  2. Describe the APT or malware strain.
  3. Discuss the implications of this type of threat for the industry in which you work.
  4. Describe the types of people that you will want to network with at this conference and describe why.
  5. Describe how you can use this conference to further advance your career.

Assignment Requirements

Combine Part 1 and Part 2 into a single Word document

The Part 1 section should be at least 5–6 pages, use 12 pt. Times New Roman, and be in APA format.

The Part 2 section (outline and discussion) should be 1 page, use 12 pt. Times New Roman.

    Similar Posts