Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you

I’m working on a cyber security project and need an explanation to help me under

AMAIZING OFFER GET 25% OFF YOUR FIRST ORDER CODE FIRST25

I’m working on a cyber security project and need an explanation to help me understand better.Project 1: Mobile Device Management (MDM) PolicyStep 1: Prepare a Scope of Work OverviewSince the CEO has agreed for you to update the company’s mobile device management (MDM) Policy, the CIO has requested you first provide a scope of work to determine the level of effort that your team will face.Prepare an overview of the scope of work by posting a brief paragraph (three to five sentences) explaining the approach and deliverable for this project with a few bullet points that address general financial industry concerns with cybersecurity and MDM.Post the overview to the scope of work discussion for feedback.Project 1: Mobile Device Management (MDM) PolicyStep 3: Itemize Critical Infrastructure ConcernsUsing notes taken from the completed research in the last step, itemize the findings in a table or spreadsheet titled Crucial Concerns Worksheet that assesses:The impact of cyberattacks on critical infrastructure as initiated by the Patriot Act of 2001 and later refined by the Department of Homeland Security (DHS).
The technologies used in critical infrastructure cyberattacks. Especially consider which and how technologies may exploit mobile device vulnerabilities.
Cybersecurity defense principles should be used to counter these cyberattacks.
This itemized list of critical infrastructure concerns will be expanded to include an evaluation of cyber-physical systems in the next step so that you can later align critical concerns to MDM policy. It will also be included as an appendix to the updated MDM policy presentation for the board of directors. Submit the Crucial Concerns Worksheet.Project 1: Mobile Device Management (MDM) PolicyStep 7: Analyze Current Technology DevelopmentsAfter documenting policy impact on critical infrastructure and describing policy issues related to cyber-physical systems and the internet of things in the previous steps, move the focus to current technology developments relevant to mobile device management such as mobile payments and bring your own device (BYOD).As the CISO of a global financial institution, analyze how such developments affect cybersecurity management and policy at the enterprise, national, and international levels. Also consider relevant technological development topics that may affect policy, such as mobile device privacy concerns. Document your findings in the final section of the Policy Alignment Report. This report will be included as an appendix to the updated MDM policy presentation for the board of directors. Submit the Policy Alignment Report.Project 1: Mobile Device Management (MDM) PolicyStep 8: Complete the Evaluating Cyber Policy eLearning ModuleAfter creating a list of crucial concerns and documenting issues of policy alignment, you are ready to evaluate the current MDM policy. Complete the Evaluating Cyber Policy eLearning Module for guidance on developing a course of action or strategy for updating the current MDM policy for the organization. Document noteworthy concepts, steps, or strategies that will help update the MDM policy in later steps.In the next step, you will consider any chain of custody impacts to the policy.Project 1: Mobile Device Management (MDM) PolicyStep 9: Address Chain of CustodyAfter reviewing the process of evaluating cyber policy in the previous step, you are nearly ready to update the MDM policy. Keeping in mind the demands should a breach occur, address two primary aspects of this concern:mobile device risk reduction (management of mobile device risk) from the employee/consultant perspective
highlighting the portion of your policies that addresses the “chain of custody” requirements if an investigation is required
Document your thoughts to be included in the updated MDM policy framework in the next step.Project 1: Mobile Device Management (MDM) PolicyStep 10: Update the MDM Policy FrameworkYou are finally ready to update the MDM policy framework. Develop final written comments for presentation at the next standards body meeting. Include any perspectives on evaluation strategy and chain of custody from the previous two steps. These comments should be between two and three pages, and should include a paragraph on your thoughts about how your comments will be received and whether or not they will have an impact on the regulations/standards, etc. Submit the MDM policy framework.Project 1: Mobile Device Management (MDM) PolicyStep 10: Update the MDM Policy FrameworkYou are finally ready to update the MDM policy framework. Develop final written comments for presentation at the next standards body meeting. Include any perspectives on evaluation strategy and chain of custody from the previous two steps. These comments should be between two and three pages, and should include a paragraph on your thoughts about how your comments will be received and whether or not they will have an impact on the regulations/standards, etc. Submit the MDM policy framework for feedback. Requirements: 7 pages