CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 34

 Describe the applications and uses of cryptography and encryption.  Use technology and information resources to research issues in security management. Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions. =================================================== CIS 502 WEEK 8 CASE STUDY Mobile Device Security and Other Threats (2 Papers) FOR MORE CLASSES VISIT www.cis502mentor.com CIS 502 WEEK 8 CASE STUDY Case Study: Mobile Device Security and Other Threats Due Week 8 and worth 110 points Read the article titled, “Mobile Devices Will Be Biggest Business Security Threat in 2014”, located at http://www.businessnewsdaily.com/5670-mobile-devices-will- be-biggest-business-security-threat-in-2014.html, and reference FIPS 140-2 Security Policy, located at http://csrc.nist.gov/groups/STM/cmvp/documents/140-