IT545 Unit 5 Assignment Part 1,2 - You are a cyber security analyst

Question # 00860574 Posted By: wildcraft Updated on: 09/13/2024 10:47 PM Due on: 09/14/2024
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image

Computer Science Unit 5 Assignment IT 545

There are two parts to this assignment. In Part 1, you will analyze the cybersecurity risks related to implementing BYOD into an organization. You will examine this with regard to legal implications, personal use and personal data, sensors, location services, always-connected, mobile device management, and multifactor authentication. In Part 2, you will write an outline for a presentation that you will give to a professional conference on Cybersecurity in the field in which you work. You will discuss who you intend to network with professionally and will evaluate how you can use the conference and the people you meet to advance your career.

Assignment Instructions

Part 1

  1. You are a cyber security analyst for a large healthcare clinic. You understand the cyber risks that exist when using cloud-based and mobile applications. The top executive of the organization wants to introduce BYOD for the employees. 
  2. The CIO has asked you to prepare a report that thoroughly analyzes the threats and risks of BYOD to the organization.
  3.  Be sure to discuss all of the following (create a section for each topic): 
    • legal agreements for data protection
    • personal use and personal data
    • sensors
    • location awareness 
    • always-on always connected
    • multifactor authentication
    • mobile device management 
  4. Make a recommendation to the CIO as to whether or not you think that BYOD should be introduced to the organization. Provide an analysis of both the pros and cons and then your final recommendation.
  5. Be sure the paper has an introduction, conclusion, in-text citations, and reference list.

Part 2

  1. Write an outline for a presentation you might give regarding advanced persistent threats (APT) or newly emerging strains of malware to a professional conference in the field in which you work.
  2. Describe the APT or malware strain.
  3. Discuss the implications of this type of threat for the industry in which you work.
  4. Describe the types of people that you will want to network with at this conference and describe why.
  5. Describe how you can use this conference to further advance your career.

Assignment Requirements

Combine Part 1 and Part 2 into a single Word document

The Part 1 section should be at least 5–6 pages, use 12 pt. Times New Roman, and be in APA format.

The Part 2 section (outline and discussion) should be 1 page, use 12 pt. Times New Roman.

Dot Image
Tutorials for this Question
  1. Tutorial # 00856076 Posted By: wildcraft Posted on: 09/13/2024 10:49 PM
    Puchased By: 2
    Tutorial Preview
    The solution of IT545 Unit 5 Assignment Part 1,2 - You are a cyber security analyst...
    Attachments
    IT545_Unit_5_Assignment_Part_1,2_-_You_are_a_cyber_security_analyst.ZIP (18.96 KB)

Great! We have found the solution of this question!

Whatsapp Lisa