please answer carefully-carefully
Employees are allowed to connect their personal devices to the corporate network However, the security administrator needs to recommend mandating some additional security practices because employees may occasionally access confidential data from their devices Which of the following practices should the security administrator suggest? (Select TWO) A) Mobile geotagging and GPS should be disabled, B) Corporate applications should be accessed on corporate Wi-Fi only, C) The number of social media sites accessible from the corporate network should be limited D) Devices should employ full disk encryption. E) Bluetooth on mobile devices should be permanently disabled,
Best Practices that should the security administrator suggests
:
B) Corporate applications should be accessed on corporate Wi-Fi
only. This will ensure that all the confidential data is getting
aired in LAN which is maintained and secured by the company.
Company can maintain the security of there server to prevent data
breach. Also, no outsider will get the company details.
D) Devices should employ full disk encryption. If the confidential data of a company gets leaked to a use somehow. It will remain encrypted and he may get no access to it or he may not understand what information that data contains.
Other Practices which may he suggests :
C) The number of social media sites accessible from the corporate
network should be limited. Most of the people use social networking
sites for file and message sharing. What if there are very few
platform available to share things on the company network. They
will have to switch to there own network to enjoy full features and
they must leave company network.
Option that doesn't suit well :
A) Mobile Geo-tagging and GPS should be disabled : To get connected
to company network one must get in the range of the network. This
will help in to get the Geo-location of the user. So, this
suggestion might fail for providing better security.
E) Bluetooth on mobile devices should be permanently disabled : Bluetooth have very few meters of range and very few bandwidth of data transfer. Data leaks from Bluetooth is not quite obvious.
please answer carefully-carefully Employees are allowed to connect their personal devices to the corporate network However,...
TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...
4. Perform a SWOT analysis for Fitbit. Based on your assessment of these, what are some strategic options for Fitbit going forward? 5. Analyze the company’s financial performance. Do trends suggest that Fitbit’s strategy is working? 6.What recommendations would you make to Fitbit management to address the most important strategic issues facing the company? Fitbit, Inc., in 2017: Can Revive Its Strategy and It Reverse Mounting Losses? connect ROCHELLE R. BRUNSON Baylor University MARLENE M. REED Baylor University in the...
Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions listed below in specific detail. A minimum of 4 pages is required; ensure that you answer all questions completely Case Questions Who are the main players (name and position)? What business (es) and industry or industries is the company in? What are the issues and problems facing the company? (Sort them by importance and urgency.) What are the characteristics of the environment in which...