CIS 513 STUDY Extraordinary Life/cis513study.com CIS 513 STUDY Extraordinary Life/cis513study.com | Page 6

FOR MORE CLASSES VISIT www . cis513study . com

CIS 513 Week 7 Case Study 2 Case Study 2 : Security in Bluetooth and other Mobile Devices
Before supporting mobile and wireless devices , organizations need to ensure that they have analyzed the potential security and implementation issues associated with those devices . Additionally , they need to ensure that they have taken the proper precautions and implemented the proper security controls to mitigate vulnerabilities . Read the NIST Draft SP 800-164 , Guidelines on Hardware-Rooted Security in Mobile Devices , located at http :// csrc . nist . gov / publications / drafts / 800-164 / sp800 _ 164 _ draft . pdf .
Write a four to five ( 4-5 ) page paper in which you :
Based on what you read in the NIST SP 800-164 publication , select an industry ( such as Banking , Finance , Education , or Healthcare ) and assess the security risks and vulnerabilities associated with mobile devices in this environment . Describe the security controls that this industry needs to implement to mitigate wireless vulnerabilities .
Assess the strategic implications of deciding to implement wireless and mobile technologies into the selected industry environment .
Analyze the factors that business managers must consider when determining if wireless and mobile devices are appropriate in their business environment .