For the below question and case study, I expect you to present your answers in a clear and logical order, develop
coherent paragraph articulate your argument and purpose clearly.
1- Discuss FISMA (Federal Information Security Management Act of 2002) and the Sarbanes-Oxley Act of 2002.
Also, talk about their relevance to cybersecurity.
2- CASE STUDY:
There is a new phenomenon in the cybersecurity domain called: “Bring Your Own Device (BYOD)” where
employees can bring their personal devices at work and connect using the Wi-Fi to the organization’s network.
Many employers are allowing their employees to use their personal mobile device for enterprise functions such
as corporate email, work applications, etc. While this may save the company costs, the organization’s network
remains vulnerable. A company can only monitor so much that’s on an employee personal device;
Assess the threats, the vulnerabilities, and the impacts on an organization’s information systems posed by the
use of mobile devices at work. What can be done to fix it at the policy level, technology level, and infrastructure
A threat is an undesirable events that can cause harm.
A vulnerability is a weakness in an organization’s systems or security policies that can be exploited to cause
Impacts are the severity of the consequences if a threat indeed causes damage by exploiting a vulnerability.
An information systems are combinations of hardware, software, telecommunications network, data, and people.
Purchase answer to see full