Before supporting mobile and wireless devices, organizations need to
ensure that they have analyzed the potential security and implementation
issues associated with those devices. Additionally, they need to ensure
that they have taken the proper precautions and implemented the proper
security controls to mitigate vulnerabilities. Read the NIST Draft SP
800-164, Guidelines on Hardware-Rooted Security in Mobile Devices,
located at
http://csrc.nist.gov/publications/drafts/800-164/sp800_164_draft.pdf.
To get this or a similar paper done by an expert writer at EssaySharkWriters.Com, Click here
1. Based on what you read in the NIST SP 800-164 publication, assess
the Healthcare industry and assess the security risks and
vulnerabilities associated with mobile devices in this environment.
Describe the security controls that this industry needs to implement to
mitigate wireless vulnerabilities.
2. Assess the strategic implications of deciding to implement
wireless and mobile technologies into the healthcare industry
environment.
3. Analyze the factors that business managers must consider when
determining if wireless and mobile devices are appropriate in their
business environment.
4. Establishing multiple layers of defense is important in security.
Describe why and how the different types of security controls are
necessary to mitigate potential security issues. Describe how the types
of radio signals and structure of wireless and cellular networks impact
the security of wireless networks.
5. Create a Network Architecture diagram depicting the layers of
security controls to mitigate security threats in a large corporate
environment through the use of graphical tools in Microsoft Word or
Visio, or an open source alternative such as Dia.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must follow
APA or school-specific format. Check with your professor for any
additional instructions.
• Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date.
The cover page and the reference page are not included in the required
assignment page length.
To get this or a similar paper done by an expert writer at EssaySharkWriters.Com, Click here
The specific course learning outcomes associated with this assignment are:
• Discuss the various types of radio waves and propagation in wireless networks.
• Analyze the structure and model of cellular networks.
• Analyze the network protocols and security mechanisms in wireless networks.
• Use technology and information resources to research issues in wireless networks.
• Write clearly and concisely about wireless computing topics using proper writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality, logic /
organization of the paper, and language and writing skills, using the
following rubric.
Points: 100 Case Study 2: Security in Bluetooth and other Mobile Devices
Criteria Unacceptable
Below 70% F Fair
70-79% C Proficient
80-89% B Exemplary
90-100% A
1. Select an industry (such as Banking, Finance, Education, or
Healthcare) and assess the security risks and vulnerabilities associated
with mobile devices in this environment. Describe the security controls
that this industry needs to implement to mitigate wireless
vulnerabilities.
Weight: 20% Did not submit or incompletely selected an industry
(such as Banking, Finance, Education, or Healthcare) and did not submit
or incompletely assessed the security risks and vulnerabilities
associated with mobile devices in this environment. Did not submit or
incompletely described the security controls that this industry needs to
implement to mitigate wireless vulnerabilities. Partially selected an
industry (such as Banking, Finance, Education, or Healthcare) and
partially assessed the security risks and vulnerabilities associated
with mobile devices in this environment. Partially described the
security controls that this industry needs to implement to mitigate
wireless vulnerabilities. Satisfactorily selected an industry (such as
Banking, Finance, Education, or Healthcare) and satisfactorily assessed
the security risks and vulnerabilities associated with mobile devices in
this environment. Satisfactorily described the security controls that
this industry needs to implement to mitigate wireless vulnerabilities.
Thoroughly selected an industry (such as Banking, Finance, Education, or
Healthcare) and thoroughly assessed the security risks and
vulnerabilities associated with mobile devices in this environment.
Thoroughly described the security controls that this industry needs to
implement to mitigate wireless vulnerabilities.
2. Assess the strategic implications of deciding to implement
wireless and mobile technologies into the selected industry environment.
Weight: 15% Did not submit or incompletely assessed the strategic
implications of deciding to implement wireless and mobile technologies
into the selected industry environment. Partially assessed the strategic
implications of deciding to implement wireless and mobile technologies
into the selected industry environment. Satisfactorily assessed the
strategic implications of deciding to implement wireless and mobile
technologies into the selected industry environment. Thoroughly assessed
the strategic implications of deciding to implement wireless and mobile
technologies into the selected industry environment.
3. Analyze the factors that business managers must consider when
determining if wireless and mobile devices are appropriate in their
business environment.
Weight: 15% Did not submit or incompletely analyzed the factors that
business managers must consider when determining if wireless and mobile
devices are appropriate in their business environment. Partially
analyzed the factors that business managers must consider when
determining if wireless and mobile devices are appropriate in their
business environment. Satisfactorily analyzed the factors that business
managers must consider when determining if wireless and mobile devices
are appropriate in their business environment. Thoroughly analyzed the
factors that business managers must consider when determining if
wireless and mobile devices are appropriate in their business
environment.
4. Describe why and how the different types of security controls are
necessary to mitigate potential security issues. Describe how the types
of radio signals and structure of wireless and cellular networks impact
the security of wireless networks.
Weight: 15% Did not submit or incompletely described why and how the
different types of security controls are necessary to mitigate
potential security issues. Did not submit or incompletely described how
the types of radio signals and structure of wireless and cellular
networks impact the security of wireless networks. Partially described
why and how the different types of security controls are necessary to
mitigate potential security issues. Partially described how the types of
radio signals and structure of wireless and cellular networks impact
the security of wireless networks. Satisfactorily described why and how
the different types of security controls are necessary to mitigate
potential security issues. Satisfactorily described how the types of
radio signals and structure of wireless and cellular networks impact the
security of wireless networks. Thoroughly described why and how the
different types of security controls are necessary to mitigate potential
security issues. Thoroughly described how the types of radio signals
and structure of wireless and cellular networks impact the security of
wireless networks.
5. Create a Network Architecture diagram depicting the layers of
security controls to mitigate security threats in a large corporate
environment through the use of graphical tools in Microsoft Word or
Visio, or an open source alternative such as Dia.
Weight: 20% Did not submit or incompletely created a Network
Architecture diagram depicting the layers of security controls to
mitigate security threats in a large corporate environment through the
use of graphical tools in Microsoft Word or Visio, or an open source
alternative such as Dia. Partially created a Network Architecture
diagram depicting the layers of security controls to mitigate security
threats in a large corporate environment through the use of graphical
tools in Microsoft Word or Visio, or an open source alternative such as
Dia. Satisfactorily created a Network Architecture diagram depicting the
layers of security controls to mitigate security threats in a large
corporate environment through the use of graphical tools in Microsoft
Word or Visio, or an open source alternative such as Dia. Thoroughly
created a Network Architecture diagram depicting the layers of security
controls to mitigate security threats in a large corporate environment
through the use of graphical tools in Microsoft Word or Visio, or an
open source alternative such as Dia.
6. 4 references
Weight: 5% No references provided Does not meet the required number
of references; some or all references poor quality choices. Meets number
of required references; all references high quality choices. Exceeds
number of required references; all references high quality choices.
7. Clarity, writing mechanics, and formatting requirements
Weight: 10% More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present
To get this or a similar paper done by an expert writer at EssaySharkWriters.Com, Click here