Overview The increasing number of remote workers introduces new vulnerabilities,

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Overview
The increasing number of remote workers introduces new vulnerabilities,

Overview
The increasing number of remote workers introduces new vulnerabilities, as employees access corporate networks from various, potentially unsecured locations. This scenario often reveals hidden expertise gaps within IT teams, who must now manage a broader range of security issues across multiple platforms. Furthermore, the integration of BYOD devices into the workplace adds another layer of complexity. These personal devices, with varied levels of security, accessing corporate networks, present unique challenges in maintaining a secure IT environment.
In this assignment, you will explore the implications of these evolving trends on the security of operating systems within an enterprise context. You will analyze how the integration of diverse operating systems, influenced by mobility and BYOD trends, impacts an organization’s security posture. Your task will involve developing strategies to mitigate risks associated with BYOD devices and one other security threat, such as ransomware, hacker scams, insider threats, remote work vulnerabilities, or hidden expertise gaps.
Preparation
Research security features of a mobile OS of your choice.
Research security risks associated with one other threat of your choice from the following list:
Ransomware.
Hacker scams.
Insider threats.
Remote work vulnerabilities.
Hidden expertise gaps.
Instructions
Complete each of the following parts in a Word document. Use clear headers that label each part and section.
Evaluate common security threats for enterprises.
Evaluate threats addressed by a BYOD policy.
Evaluate threats addressed by one other security policy.
Explain the risk factors associated with mobile devices and one other security threat.
Analyze the vulnerabilities that inform these risks.
Analyze security protocols on routers and switches.
Support the analysis with reference to scholarly or industry research on common security threats.
Evaluate how features of a specific mobile OS keep their devices secure.
Additional Requirements
Your assignment should also to meet the following requirements:
Written communication: Written communication should convey the writer’s purpose in an appropriate tone and style that adheres to professional writing standards and incorporates evidence where relevant. Visit the Capella Writing CenterLinks to an external site. for a variety of helpful writing resources.
Format: Submit your assignment in a Word document with well-labeled responses.
Cited sources: All literature cited should be current, with publication dates within the past five years. Visit the Capella University LibraryLinks to an external site. for a variety of research resources.
APA format: Resources, citations, title page, and reference page should be formatted according to current APA style and formatting standards. Visit Evidence and APALinks to an external site. for resources to help you with APA format.
Competencies Measured
By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:
Competency 1: Apply core concepts, technologies, components, and issues related to communications and data networks.
Analyze security protocols on routers and switches as supported by scholarly or industry research on common security threats.
Competency 2: Analyze common enterprise security threats and associated risk factors.
Analyze common security threats for enterprises impacted by a BYOD policy and one other policy that impacts security.
Explain the risk factors associated with mobile devices and one other security threat.
Analyze how features of a specific mobile OS keep their devices secure.
Competency 6: Communicate effectively and professionally.
Write with few spelling, grammatical, or mechanical errors.
Strategic Mobility and Security in a Complex World
Strategic Mobility and Security in a Complex World
Criteria Ratings Pts
Analyze common security threats for enterprises impacted by a BYOD policy and one other policy that impacts security.
16 to >13.6 pts
DISTINGUISHED
Evaluates common security threats to an enterprise posed by a BYOD policy and one other policy that impacts security.
13.6 to >11.2 pts
PROFICIENT
Analyzes common security threats to an enterprise posed by a BYOD policy and one other policy that impacts security.
11.2 to >0 pts
BASIC
Describes common security threats to an enterprise posed by a BYOD policy or one other policy that impacts security.
0 pts
NON_PERFORMANCE
Does not describe common security threats to an enterprise posed by a BYOD policy or one other policy that impacts security.
/ 16 pts
Explain the risk factors associated with mobile devices and one other security threat.
16 to >13.6 pts
DISTINGUISHED
Explains the risk factors associated with mobile devices and one other security threat, and analyzes the vulnerabilities that inform these risks.
13.6 to >11.2 pts
PROFICIENT
Explains the risk factors associated with mobile devices and one other security threat.
11.2 to >0 pts
BASIC
Lists the risk factors associated with mobile devices and one other security threat or explains them in a way that is incorrect or confusing.
0 pts
NON_PERFORMANCE
Does not list the risk factors associated with mobile devices and one other security threat.
/ 16 pts
Analyze security protocols on routers and switches as supported by scholarly or industry research on common security threats.
16 to >13.6 pts
DISTINGUISHED
Analyzes security protocols on routers and switches as supported by scholarly or industry research on common security threats, including a description of what was learned from the research.
13.6 to >11.2 pts
PROFICIENT
Analyzes security protocols on routers and switches as supported by scholarly or industry research on common security threats.
11.2 to >0 pts
BASIC
Analyzes security protocols on routers and switches without support from scholarly or industry research on common security threats.
0 pts
NON_PERFORMANCE
Does not analyze security protocols on routers and switches.
/ 16 pts
Analyze how features of a specific mobile OS keep their devices secure.
16 to >13.6 pts
DISTINGUISHED
Evaluates how features of a specific mobile OS keep their devices secure.
13.6 to >11.2 pts
PROFICIENT
Analyzes how features of a specific mobile OS keep their devices secure.
11.2 to >0 pts
BASIC
Describes how features of a specific mobile OS keep their devices secure or produces an analysis that is flawed or lacks depth.
0 pts
NON_PERFORMANCE
Does not describe how features of a specific mobile OS keep their devices secure.
/ 16 pts
Write with few spelling, grammatical, or mechanical errors.
16 to >13.6 pts
DISTINGUISHED
Writes with no spelling, grammatical, or mechanical errors.
13.6 to >11.2 pts
PROFICIENT
Writes with few spelling, grammatical, or mechanical errors.
11.2 to >0 pts
BASIC
Writes with several spelling, grammatical, or mechanical errors.
0 pts
NON_PERFORMANCE
Writes with many spelling, grammatical, or mechanical errors.
/ 16 pts
Total Points: 0

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now