Overview
The increasing number of remote workers introduces new vulnerabilities, as employees access corporate networks from various, potentially unsecured locations. This scenario often reveals hidden expertise gaps within IT teams, who must now manage a broader range of security issues across multiple platforms. Furthermore, the integration of BYOD devices into the workplace adds another layer of complexity. These personal devices, with varied levels of security, accessing corporate networks, present unique challenges in maintaining a secure IT environment.
In this assignment, you will explore the implications of these evolving trends on the security of operating systems within an enterprise context. You will analyze how the integration of diverse operating systems, influenced by mobility and BYOD trends, impacts an organization’s security posture. Your task will involve developing strategies to mitigate risks associated with BYOD devices and one other security threat, such as ransomware, hacker scams, insider threats, remote work vulnerabilities, or hidden expertise gaps.
Preparation
Research security features of a mobile OS of your choice.
Research security risks associated with one other threat of your choice from the following list:
Ransomware.
Hacker scams.
Insider threats.
Remote work vulnerabilities.
Hidden expertise gaps.
Instructions
Complete each of the following parts in a Word document. Use clear headers that label each part and section.
Evaluate common security threats for enterprises.
Evaluate threats addressed by a BYOD policy.
Evaluate threats addressed by one other security policy.
Explain the risk factors associated with mobile devices and one other security threat.
Analyze the vulnerabilities that inform these risks.
Analyze security protocols on routers and switches.
Support the analysis with reference to scholarly or industry research on common security threats.
Evaluate how features of a specific mobile OS keep their devices secure.
Additional Requirements
Your assignment should also to meet the following requirements:
Written communication: Written communication should convey the writer’s purpose in an appropriate tone and style that adheres to professional writing standards and incorporates evidence where relevant. Visit the Capella Writing CenterLinks to an external site. for a variety of helpful writing resources.
Format: Submit your assignment in a Word document with well-labeled responses.
Cited sources: All literature cited should be current, with publication dates within the past five years. Visit the Capella University LibraryLinks to an external site. for a variety of research resources.
APA format: Resources, citations, title page, and reference page should be formatted according to current APA style and formatting standards. Visit Evidence and APALinks to an external site. for resources to help you with APA format.
Competencies Measured
By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:
Competency 1: Apply core concepts, technologies, components, and issues related to communications and data networks.
Analyze security protocols on routers and switches as supported by scholarly or industry research on common security threats.
Competency 2: Analyze common enterprise security threats and associated risk factors.
Analyze common security threats for enterprises impacted by a BYOD policy and one other policy that impacts security.
Explain the risk factors associated with mobile devices and one other security threat.
Analyze how features of a specific mobile OS keep their devices secure.
Competency 6: Communicate effectively and professionally.
Write with few spelling, grammatical, or mechanical errors.
Strategic Mobility and Security in a Complex World
Strategic Mobility and Security in a Complex World
Criteria Ratings Pts
Analyze common security threats for enterprises impacted by a BYOD policy and one other policy that impacts security.
16 to >13.6 pts
DISTINGUISHED
Evaluates common security threats to an enterprise posed by a BYOD policy and one other policy that impacts security.
13.6 to >11.2 pts
PROFICIENT
Analyzes common security threats to an enterprise posed by a BYOD policy and one other policy that impacts security.
11.2 to >0 pts
BASIC
Describes common security threats to an enterprise posed by a BYOD policy or one other policy that impacts security.
0 pts
NON_PERFORMANCE
Does not describe common security threats to an enterprise posed by a BYOD policy or one other policy that impacts security.
/ 16 pts
Explain the risk factors associated with mobile devices and one other security threat.
16 to >13.6 pts
DISTINGUISHED
Explains the risk factors associated with mobile devices and one other security threat, and analyzes the vulnerabilities that inform these risks.
13.6 to >11.2 pts
PROFICIENT
Explains the risk factors associated with mobile devices and one other security threat.
11.2 to >0 pts
BASIC
Lists the risk factors associated with mobile devices and one other security threat or explains them in a way that is incorrect or confusing.
0 pts
NON_PERFORMANCE
Does not list the risk factors associated with mobile devices and one other security threat.
/ 16 pts
Analyze security protocols on routers and switches as supported by scholarly or industry research on common security threats.
16 to >13.6 pts
DISTINGUISHED
Analyzes security protocols on routers and switches as supported by scholarly or industry research on common security threats, including a description of what was learned from the research.
13.6 to >11.2 pts
PROFICIENT
Analyzes security protocols on routers and switches as supported by scholarly or industry research on common security threats.
11.2 to >0 pts
BASIC
Analyzes security protocols on routers and switches without support from scholarly or industry research on common security threats.
0 pts
NON_PERFORMANCE
Does not analyze security protocols on routers and switches.
/ 16 pts
Analyze how features of a specific mobile OS keep their devices secure.
16 to >13.6 pts
DISTINGUISHED
Evaluates how features of a specific mobile OS keep their devices secure.
13.6 to >11.2 pts
PROFICIENT
Analyzes how features of a specific mobile OS keep their devices secure.
11.2 to >0 pts
BASIC
Describes how features of a specific mobile OS keep their devices secure or produces an analysis that is flawed or lacks depth.
0 pts
NON_PERFORMANCE
Does not describe how features of a specific mobile OS keep their devices secure.
/ 16 pts
Write with few spelling, grammatical, or mechanical errors.
16 to >13.6 pts
DISTINGUISHED
Writes with no spelling, grammatical, or mechanical errors.
13.6 to >11.2 pts
PROFICIENT
Writes with few spelling, grammatical, or mechanical errors.
11.2 to >0 pts
BASIC
Writes with several spelling, grammatical, or mechanical errors.
0 pts
NON_PERFORMANCE
Writes with many spelling, grammatical, or mechanical errors.
/ 16 pts
Total Points: 0
Overview The increasing number of remote workers introduces new vulnerabilities,
Struggling With a Similar Paper? Get Reliable Help Now.
Delivered on time. Plagiarism-free. Good Grades.
What is this?
It’s a homework service designed by a team of 23 writers based in Carlsbad, CA with one specific goal – to help students just like you complete their assignments on time and get good grades!
Why do you do it?
Because getting a degree is hard these days! With many students being forced to juggle between demanding careers, family life and a rigorous academic schedule. Having a helping hand from time to time goes a long way in making sure you get to the finish line with your sanity intact!
How does it work?
You have an assignment you need help with. Instead of struggling on this alone, you give us your assignment instructions, we select a team of 2 writers to work on your paper, after it’s done we send it to you via email.
What kind of writer will work on my paper?
Our support team will assign your paper to a team of 2 writers with a background in your degree – For example, if you have a nursing paper we will select a team with a nursing background. The main writer will handle the research and writing part while the second writer will proof the paper for grammar, formatting & referencing mistakes if any.
Our team is comprised of native English speakers working exclusively from the United States.
Will the paper be original?
Yes! It will be just as if you wrote the paper yourself! Completely original, written from your scratch following your specific instructions.
Is it free?
No, it’s a paid service. You pay for someone to work on your assignment for you.
Is it legit? Can I trust you?
Completely legit, backed by an iron-clad money back guarantee. We’ve been doing this since 2007 – helping students like you get through college.
Will you deliver it on time?
Absolutely! We understand you have a really tight deadline and you need this delivered a few hours before your deadline so you can look at it before turning it in.
Can you get me a good grade? It’s my final project and I need a good grade.
Yes! We only pick projects where we are sure we’ll deliver good grades.
What do you need to get started on my paper?
* The full assignment instructions as they appear on your school account.
* If a Grading Rubric is present, make sure to attach it.
* Include any special announcements or emails you might have gotten from your Professor pertaining to this assignment.
* Any templates or additional files required to complete the assignment.
How do I place an order?
You can do so through our custom order page here or you can talk to our live chat team and they’ll guide you on how to do this.
How will I receive my paper?
We will send it to your email. Please make sure to provide us with your best email – we’ll be using this to communicate to you throughout the whole process.
Getting Your Paper Today is as Simple as ABC
No more missed deadlines! No more late points deductions!
You give us your assignments instructions via email or through our order page.
Our support team selects a qualified writing team of 2 writers for you.
In under 5 minutes after you place your order, research & writing begins.
Complete paper is delivered to your email before your deadline is up.
Want A Good Grade?
Get a professional writer who has worked on a similar assignment to do this paper for you