Security Architect

Management approved a pilot program in which a controlled group of users can access certain company data from personally-owned mobile devices instead of purchasing corporate mobile devices for employees and contractors. As the Security Architect, you must provide Bring Your Own Device (BYOD) security best practice guidelines for employees to secure any personal mobile device used in the pilot program. Your task is to create a document demonstrating appropriate security settings.

Configure the mobile device security settings as follows, taking screenshots to demonstrate your knowledge:

Android or Apple:

  1. Update your operating system and applications.
  2. Encrypt phone with a strong passcode.
  3. Back up your data.
  4. Limit ad tracking under “Privacy, Advertising.”
  5. Set up SIM card lock.
  6. Disable Bluetooth and/or WiFi when not in use.

Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and that definitions are current.

Submit your assignment using the Assignment Files tab.

 

Question 2

What strategic recommendations would you make?
What operational security aspects should be considered so as to prevent such attacks in the future?
What sort of an encryption policy, if any, would have helped in this situation?

Requirements:
• This assignment is critical thinking need deep analysis and understand.
• This Scenario is a case study, which need more actions in real life .. No need for many definition or types. Please read the question carefully
• Your paper should be 4 pages in length, not counting the title or reference pages, which must be included.
• Include at least two scholarly references in addition to the course textbook. The Saudi Digital Library is a good source for resources.
• Provide information from your readings and previous assignments to support your review.
• Your paper must follow writing standards and APA style guidelines, as appropriate.
• You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading.
• We need to avoid the plagiarism.
• You need to meet al requirements.

Do you need help with this assignment or any other? We got you! Place your order and leave the rest to our experts.

Quality Guaranteed

Any Deadline

No Plagiarism