title , and the date . The cover page and the reference page are not included in the required assignment page length . The specific course learning outcomes associated with this assignment are :
� Analyze the methods of managing , controlling , and mitigating security risks and vulnerabilities .
� Define common and emerging security issues and management responsibilities .
� Explain access control methods and attacks .
� Describe the applications and uses of cryptography and encryption .
� Use technology and information resources to research issues in security management .
Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions .
==============================================
CIS 502 WEEK 8 CASE STUDY Mobile Device Security and Other Threats ( 2 Papers )
CIS 502 WEEK 8 CASE STUDY
title , and the date . The cover page and the reference page are not included in the required assignment page length . The specific course learning outcomes associated with this assignment are :
� Analyze the methods of managing , controlling , and mitigating security risks and vulnerabilities .
� Define common and emerging security issues and management responsibilities .
� Explain access control methods and attacks .
� Describe the applications and uses of cryptography and encryption .
� Use technology and information resources to research issues in security management .
Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions .
==============================================
CIS 502 WEEK 8 CASE STUDY Mobile Device Security and Other Threats ( 2 Papers )