Since the CEO has agreed for you to update the company’s mobile device management (Mobile device management consists of the policies and procedures used to minimize risks presented by smartphones, tablets, and laptops. Both company-owned and personal devices used in the workplace or to can present threats to cybersecurity, physical security, and intellectual property.
Cyber criminals who gain access to mobile devices can track the locations and activities of users. Data can be stolen from the device or other devices and databases in a network. Sometimes, the device can be used to access physical facilities. Additionally, users can be denied access to their device or network, often as a form of cyber blackmail.) Policy, the CIO has requested you first provide a scope of work (A mobile device management scope of work is the agreement portion of an enterprise cyber program presentation that establishes the terms and conditions between the provider and client when implementing a project. It should also describe activities, deliverables, milestones, timelines for such items, and other related criteria. It may address elements such as but not limited to infrastructure, delivery, devices, content, innovation, and governance within the business needs.
Allocation of Equipment and Funding
Deliverable and Milestone Terms
Adherence to Appropriate Code, Licensing, and Permit Regulations
Fair Opportunity Disclosure
) to determine the level of effort that your team will face.
Prepare an overview of the scope of work by posting a brief paragraph (three to five sentences) explaining the approach and deliverable for this project with a few bullet points that address general financial industry concerns with cybersecurity and MDM.
Post the overview to the scope of work discussion for feedback. Afterward, move to the next step, in which you will consider critical infrastructure and how it will affect compliance.
Step 2: Research Critical Infrastructure Concerns
After defining the scope of work, you are ready to begin updating the MDM policy. In order to determine the effectiveness of the current policy, research what critical infrastructure protection concerns affect compliance.
Consider the following list to guide your research:
impact of cyberattacks on critical infrastructure as defined by the Patriot Act of 2001
technologies used in critical infrastructure cyberattacks
cybersecurity defense principles that should be used to counter these cyberattacks
cybersecurity policy framework that should be employed to minimize the opportunity for a successful critical infrastructure cyberattack
Document the findings since they will be used in upcoming steps. In the next step, you will itemize those concerns.
Step 3: Itemize Critical Infrastructure Concerns
Using notes taken from the completed research in the last step, itemize the findings in a table or spreadsheet titled that assesses:
The impact of cyberattacks on critical infrastructure as initiated by the Patriot Act of 2001 and later refined by the Department of Homeland Security (DHS).
The technologies used in critical infrastructure cyberattacks. Especially consider which and how technologies may exploit mobile device vulnerabilities.
Cybersecurity defense principles should be used to counter these cyberattacks.
This itemized list of critical infrastructure concerns will be expanded to include an evaluation of cyber-physical systems in the next step so that you can later align critical concerns to MDM policy. It will also be included as an appendix to the updated MDM policy presentation for the board of directors. Submit the Crucial Concerns Worksheet for feedback.
Step 4: (CPS) and Internet of Things (IoT)
In this phase of the project, you will (CPS) and the internet of things (IoT) to build upon the critical infrastructure concerns itemized in the previous step.
Assuming that you have addressed most of the concerns related to MDM from a policy perspective, begin an itemized list of potential countermeasures. In recognition of , education, and research conducted here, continue to expand the worksheet by specifically addressing issues relating to cyber-physical systems and the internet of things.
Briefly evaluate cybersecurity hardware, software, and network technological components of cyber-physical systems and the policy issues that they require. Also consider Wi-Fi and Bluetooth technologies and the policy issues they require.
Add this evaluation to the Crucial Concerns Worksheet completed in the previous step. This worksheet will be used to align to MDM policy later in the project and will be included as an appendix to the updated MDM policy presentation for the board of directors, and will be assessed as part of the final Project. Name the files Appendix 1, Appendix 2, etc. Submit the updated table or spreadsheet for feedback.
Step 5: Document Policy Impact
Now that you have listed crucial concerns surrounding critical infrastructure, cyber-physical systems, and the internet of things, in this step, you will report on policy impact.
the impact, if any, on the critical infrastructure of the company’s mobile device management policies
policy or compliance initiatives that can address these concerns.
a recommended cybersecurity policy framework that when deployed would minimize the opportunity for a successful critical infrastructure cyberattack
Compile your ideas in a report titled Policy Alignment. Create a section in your report titled Policy Impact to document your ideas. This report will also be included as an appendix to the updated MDM policy presentation for the board of directors. You will add to this report in the next step.
Step 6: Describe Policy Issues Related to Cyber-Physical Systems and Internet of Things (IoT)
Continue to build the Policy Alignment report from the previous step. Now that policy impact has been considered, you will examine policy issues related to cyber-physical systems (CPS) and the internet of things (IoT).
Create two sections in the Policy Alignment report. The first section will be titled Policy Issues Related to Cyber-Physical Systems. In this section of the report, describe enterprise, national, and international cybersecurity policy issues that arise due to the deployment of cyber-physical systems. In the second section, titled Policy Issues Related to IoT, describe enterprise, national, and international cybersecurity policy issues that arise due to the effect of the internet of things.
This report will also be included as an appendix to the updated MDM policy presentation for the board of directors. You will add to this report in the next step.
Step 7: Analyze Current Technology Developments
After documenting policy impact on critical infrastructure and describing policy issues related to cyber-physical systems and the internet of things in the previous steps, move the focus to current technology developments relevant to mobile device management such as mobile payments and bring your own device (BYOD).
As the CISO of a global financial institution, analyze how such developments affect cybersecurity management and policy at the enterprise, national, and international levels. Also consider relevant technological development topics that may affect policy, such as mobile device privacy concerns. Document your findings in the final section of the Policy Alignment Report. This report will be included as an appendix to the updated MDM policy presentation for the board of directors. Submit the Policy Alignment Report for feedback, and will be assessed as part of the final Project. Name the files Appendix 1, Appendix 2, etc.
Step 8: Complete the Evaluating Cyber Policy eLearning Module
After creating a list of crucial concerns and documenting issues of policy alignment, you are ready to evaluate the current MDM policy. Complete the Evaluating Cyber Policy eLearning Module for guidance on developing a course of action or strategy for updating the current MDM policy for the organization. Document noteworthy concepts, steps, or strategies that will help update the MDM policy in later steps.
In the next step, you will consider any chain of custody impacts to the policy
Step 9: Address Chain of Custody
After reviewing the process of evaluating cyber policy in the previous step, you are nearly ready to update the MDM policy. Keeping in mind the demands should a breach occur, address two primary aspects of this concern:
mobile device risk reduction (management of mobile device risk) from the employee/consultant perspective
highlighting the portion of your policies that addresses the “chain of custody” requirements if an investigation is required
Document your thoughts to be included in the updated MDM policy framework in the next step.
Step 10: Update the MDM Policy Framework
You are finally ready to update the MDM policy framework. Develop final written comments for presentation at the next standards body meeting. Include any perspectives on evaluation strategy and chain of custody from the previous two steps. These comments should be between two and three pages, and should include a paragraph on your thoughts about how your comments will be received and whether or not they will have an impact on the regulations/standards, etc. Submit the MDM policy framework for feedback. This framework will serve as the basis for your presentation, and will be assessed as part of the final Project. Name the files Appendix 1, Appendix 2, etc.
Step 11: Submit the MDM Policy Presentation
The final phase of the project is to deliver a presentation on the MDM findings and policy recommendations to management that summarizes the results. This will include an update to the Policy Framework from the previous step according to received feedback. You are allotted 15 minutes for the presentation.
Refer to the MDM Policy Presentation Instructions for detailed requirements. Submit the MDM Policy Presentation.
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
There is a very low likelihood that you won’t like the paper.
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more