CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 34
Describe the applications and uses of cryptography
and encryption.
Use technology and information resources to research
issues in security management.
Write clearly and concisely about the theories of security
management using proper writing mechanics and technical style
conventions.
===================================================
CIS 502 WEEK 8 CASE STUDY Mobile Device Security
and Other Threats (2 Papers)
FOR MORE CLASSES VISIT
www.cis502mentor.com
CIS 502 WEEK 8 CASE STUDY
Case Study: Mobile Device Security and Other Threats
Due Week 8 and worth 110 points
Read the article titled, “Mobile Devices Will Be Biggest
Business Security Threat in 2014”, located at
http://www.businessnewsdaily.com/5670-mobile-devices-will-
be-biggest-business-security-threat-in-2014.html, and reference
FIPS 140-2 Security Policy, located at
http://csrc.nist.gov/groups/STM/cmvp/documents/140-