QR Code Research – Research how companies are using this technology. Is a QR Code an input or output device? What are the benefits? Is there a downside? Your answer should be a minimum of 100 words.QR Code Creation – Watch the video: QR Code Assignment, this will show how to create your own QR code. Use www.qrstuff.com to create your code.Create a Blog post in Blackboard. Submit your answer to the QR Code Research questions. Also post the QR Code you created. Use the Title: Personal QR Code. You can see an example at http://jneighborsbusn1190.blogspot.com/Review at least two student Personal QR Code posts. Using your SmartPhone or other QR Reading device, comment on what you believe their QR Code says.
Begin thinking of mobile device security in a business situation. Select a fictional or real corporate or university environment that requires mobile access. Use the Q & A Forum to ask questions and discuss your ideas about the project.
Proposal
Course Project Proposal (one to two pages, 35 points). Remember to properly cite any external sources used.
The proposal should contain the following items.
Cover page
Subject of the Course Project
Name of the company or organization
Brief description of the company chosen
Value proposition of the company
Size of the workforce (students included if the company chosen is an academic institution) with respect to IT infrastructure needs
Overview of the different types of mobile networks available in the company
Overview of types of mobile devices and storage media used in the company
Identification of potential mobile security risks
Audience to whom you are presenting the recommendation(s)
References
Technical Report (four to five pages, 65 points). Remember to properly cite any external sources used. The technical report should contain the following items.
Cover page
Introduction
Intentional versus unintentional mobility scenarios in the company
Protection of data
Physical protection mechanisms
Logical protection mechanisms
Protecting heterogeneous information
Protecting data in motion
Data protection models
Using a device-centric or data-centric model for the case study; which one is better?
Encryption
Types of encryption employed by the company’s IT department
As a recent graduate of the UMGC Master’s in Cybersecurity program, you have received a well-deserved promotion to chief information security officer (CISO) at the global financial institution where you work. The role is new for you and the company. It reports directly to the chief information officer (CIO), which for the purposes of this course, is the instructor. Much of what you will be doing in the next couple of months is centered around the policy aspects of the bank.
The CIO has lobbied for your role to be created as a result of four concerns that will require your expertise and focus. In general, you are told you will be addressing the following four projects:
• Mobile Device Management (MDM)
• Identity Theft
• Digital Currency
• Enterprise Policy
Now that you have an idea of the tasks ahead, the first project will be developing recommendations for mobile device management, which will include written comments and a presentation for the company’s leadership. This is the first of four sequential projects in this course and should be completed in about two weeks. There are 11 steps to complete in Project 1. Contact the CIO (your instructor) with any questions. Proceed to Step 1 to begin.
Competencies
Your work will be evaluated using the competencies listed below.
• 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
• 2.4: Consider and analyze information in context to the issue or problem.
• 8.1: Report on current developments in cybersecurity management and policy.
Project 1: Mobile Device Management (MDM) Policy
Step 1: Prepare a Scope of Work Overview
Since the CEO has agreed for you to update the company’s mobile device management (MDM) Policy, the CIO has requested you first provide a scope of work to determine the level of effort that your team will face.
Prepare an overview of the scope of work by posting a brief paragraph (three to five sentences) explaining the approach and deliverable for this project with a few bullet points that address general financial industry concerns with cybersecurity and MDM.
Post the overview to the scope of work discussion for feedback. Afterward, move to the next step, in which you will consider critical infrastructure and how it will affect compliance.
Step 2: Research Critical Infrastructure Concerns
After defining the scope of work, you are ready to begin updating the MDM policy. In order to determine the effectiveness of the current policy, research what critical infrastructure protection concerns affect compliance.
Consider the following list to guide your research:
• impact of cyberattacks on critical infrastructure as defined by the Patriot Act of 2001
• technologies used in critical infrastructure cyberattacks
• cybersecurity defense principles that should be used to counter these cyberattacks
• cybersecurity policy framework that should be employed to minimize the opportunity for a successful critical infrastructure cyberattack
Document the findings since they will be used in upcoming steps. In the next step, you will itemize those concerns.
Step 3: Itemize Critical Infrastructure Concerns
Using notes taken from the completed research in the last step, itemize the findings in a table or spreadsheet titled Crucial Concerns Worksheet that assesses:
• The impact of cyberattacks on critical infrastructure as initiated by the Patriot Act of 2001 and later refined by the Department of Homeland Security (DHS).
• The technologies used in critical infrastructure cyberattacks. Especially consider which and how technologies may exploit mobile device vulnerabilities.
• Cybersecurity defense principles should be used to counter these cyberattacks.
This itemized list of critical infrastructure concerns will be expanded to include an evaluation of cyber-physical systems in the next step so that you can later align critical concerns to MDM policy. It will also be included as an appendix to the updated MDM policy presentation for the board of directors. Submit the Crucial Concerns Worksheet for feedback.
Submission for Project 1: Crucial Concerns Worksheet
Previous submissions
0
Step 4: Evaluate Cyber-Physical Systems (CPS) and Internet of Things (IoT)
In this phase of the project, you will evaluate cyber-physical systems (CPS) and the internet of things (IoT) to build upon the critical infrastructure concerns itemized in the previous step.
Assuming that you have addressed most of the concerns related to MDM from a policy perspective, begin an itemized list of potential countermeasures. In recognition of on-the-job training, education, and research conducted here, continue to expand the worksheet by specifically addressing issues relating to cyber-physical systems and the internet of things.
Briefly evaluate cybersecurity hardware, software, and network technological components of cyber-physical systems and the policy issues that they require. Also consider Wi-Fi and Bluetooth technologies and the policy issues they require.
Add this evaluation to the Crucial Concerns Worksheet completed in the previous step. This worksheet will be used to align to MDM policy later in the project and will be included as an appendix to the updated MDM policy presentation for the board of directors, and will be assessed as part of the final Project. Name the files Appendix 1, Appendix 2, etc. Submit the updated table or spreadsheet for feedback.
Submission for Project 1: Crucial Concerns Worksheet
Previous submissions
Step 5: Document Policy Impact
Now that you have listed crucial concerns surrounding critical infrastructure, cyber-physical systems, and the internet of things, in this step, you will report on policy impact.
Specifically consider:
• the impact, if any, on the critical infrastructure of the company’s mobile device management policies
• policy or compliance initiatives that can address these concerns.
• a recommended cybersecurity policy framework that when deployed would minimize the opportunity for a successful critical infrastructure cyberattack
Compile your ideas in a report titled Policy Alignment. Create a section in your report titled Policy Impact to document your ideas. This report will also be included as an appendix to the updated MDM policy presentation for the board of directors. You will add to this report in the next step.
Step 6: Describe Policy Issues Related to Cyber-Physical Systems and Internet of Things (IoT)
Continue to build the Policy Alignment report from the previous step. Now that policy impact has been considered, you will examine policy issues related to cyber-physical systems (CPS) and the internet of things (IoT).
Create two sections in the Policy Alignment report. The first section will be titled Policy Issues Related to Cyber-Physical Systems. In this section of the report, describe enterprise, national, and international cybersecurity policy issues that arise due to the deployment of cyber-physical systems. In the second section, titled Policy Issues Related to IoT, describe enterprise, national, and international cybersecurity policy issues that arise due to the effect of the internet of things.
This report will also be included as an appendix to the updated MDM policy presentation for the board of directors. You will add to this report in the next step.
Step 7: Analyze Current Technology Developments
After documenting policy impact on critical infrastructure and describing policy issues related to cyber-physical systems and the internet of things in the previous steps, move the focus to current technology developments relevant to mobile device management such as mobile payments and bring your own device (BYOD).
As the CISO of a global financial institution, analyze how such developments affect cybersecurity management and policy at the enterprise, national, and international levels. Also consider relevant technological development topics that may affect policy, such as mobile device privacy concerns. Document your findings in the final section of the Policy Alignment Report. This report will be included as an appendix to the updated MDM policy presentation for the board of directors. Submit the Policy Alignment Report for feedback, and will be assessed as part of the final Project. Name the files Appendix 1, Appendix 2, etc.
Submission for Project 1: Policy Alignment Report
Previous submissions
Step 8: Complete the Evaluating Cyber Policy eLearning Module
After creating a list of crucial concerns and documenting issues of policy alignment, you are ready to evaluate the current MDM policy. Complete the Evaluating Cyber Policy eLearning Module for guidance on developing a course of action or strategy for updating the current MDM policy for the organization. Document noteworthy concepts, steps, or strategies that will help update the MDM policy in later steps.
In the next step, you will consider any chain of custody impacts to the policy.
Step 9: Address Chain of Custody
After reviewing the process of evaluating cyber policy in the previous step, you are nearly ready to update the MDM policy. Keeping in mind the demands should a breach occur, address two primary aspects of this concern:
• mobile device risk reduction (management of mobile device risk) from the employee/consultant perspective
• highlighting the portion of your policies that addresses the “chain of custody” requirements if an investigation is required
Document your thoughts to be included in the updated MDM policy framework in the next step.
Step 10: Update the MDM Policy Framework
You are finally ready to update the MDM policy framework. Develop final written comments for presentation at the next standards body meeting. Include any perspectives on evaluation strategy and chain of custody from the previous two steps. These comments should be between two and three pages, and should include a paragraph on your thoughts about how your comments will be received and whether or not they will have an impact on the regulations/standards, etc. Submit the MDM policy framework for feedback. This framework will serve as the basis for your presentation, and will be assessed as part of the final Project. Name the files Appendix 1, Appendix 2, etc.
Submission for Project 1: MDM Policy Framework
Previous submissions
Step 11: Submit the MDM Policy Presentation
The final phase of the project is to deliver a presentation on the MDM findings and policy recommendations to management that summarizes the results. This will include an update to the Policy Framework from the previous step according to received feedback. You are allotted 15 minutes for the presentation.
Refer to the MDM Policy Presentation Instructions for detailed requirements. Submit the MDM Policy Presentation.
Check Your Evaluation Criteria
Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.
• 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
• 2.4: Consider and analyze information in context to the issue or problem.
• 8.1: Report on current developments in cybersecurity management and policy.
Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Mobile Device Management (MDM) Policy
Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Why You Should Abandon Your Android Device and Start Using an iPhone?
Task-1: Network Configuration Marking guide lines: • Design an efficient IP addressing plan: 4 marks o Note that you need to spare IP addresses for the management LAN. o Use this guideline to help you with this task: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-smart-business-architecture/sba_ipAddr_dg.pdf • Correct administrative configuration and secure device access: 4 marks o Configure device name, access banner, domain-lookup o Configure and secure all device access passwords o Disable all unused ports • Configure all required device interfaces with appropriate IP addresses and meaningful descriptions and assign IP addresses to all PCs in the network: 2 marks • Configure IP routing and verify the network connectivity and fix any issues: 4 mark o Configure OSPF routing for the network o Verify the network connectivity with ping. • Backup all device configuration to a TFTP server in the head quarter: 1 mark o Configure a TFTP server in the HQ o Issues commands to backup all device config to the TFTP server. Task-2: Network Management Marking guide lines: • Design the high-level physical layout for the lab to show the cabling structure and equipment rack and export it to a JPEG or PDF file. (4 marks) • Modify the current network to add the management network (6 marks) o Create the management interface for the switches (VLAN99) and assign IP addresses to all routers and management interfaces (2 marks) o Allocate a dedicate physical management port on each switch an assign the management port to VLAN99 (1 mark). o Connect the management port to a physical interface of the local router (1 mark). o Configure the router interface and modify the network routing to allow to connect to the management network (2 marks). • Configure SNMPv2 on each network devices and deploy a network management station at the head quarter to manage the whole network. (3 marks) o Create a network management station in the head quarter to manager the network. Assign IP address to the station (1 mark). o Configure a MIB browser on the management station to access the device management information (2 marks). • Record YouTube video to demonstrate that you can manage the devices (2 marks)
Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Correct administrative configuration and secure device access
Length: Minimum of 400 words Students will be required to create 1 new thread, and provide substantive comments on at least 3 threads created by other students. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.Question:The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Protections from the security software must continue when the device is taken off the network