Description
- Include problem statement and recommended solution slides from previous deliverable for reference.
- Explain the risks that BYOD paused to the organizations critical computing resources and ways to mitigate that risk in a cost-effective manner.
- Demonstrate how the use of encryption can be used to enhance authenticity, confidentiality, integrity, and non-repudiation in the organization.
- Given a combination of malware attack on key systems coupled with BYOD and endpoint security, develop a plan to effectively implement your proposed solution.
- The plan should include the implementation flow diagram (order of major tasks), required resources, and high-level procedures.
- Formulate a cost-benefit analysis (CBA) using existing conceptual frameworks. See Appendix A for more information.
- Describe how the solution will be validated before deployment.
- Describe how the solution will be evaluated and continuously improved in operation.
- Describe how the solution, data and software, will be decommissioned once it reaches end of life.
- Discuss any legal, ethical, and cultural considerations associated with the solution.