CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 45
3. Assess and describe the value of cryptography and encryption
in regard to Equifax’s approach to implementing stronger
security policies around mobile devices.
4. Justify Gunter Ollmann’s comments about Zeus-in-the-
Mobile (ZitMo) and describe the implications of advanced
security breaches such as this.
5. Several challenges of controlling information online are set
forth in the section of the article titled, “Controlling Information
Online – A New Frontier in Information