Discussion 1. "Policy for Portable and Mobile Devices"
Answer the following question
• Determine the primary considerations that an organization would need to take into account when developing the security policies involving bring your own device (BYOD), portable and mobile devices.
• List and examine the major challenges of enforcing policies concerning BYOD, portable and mobile devices.
Discussion 2. Demilitarized Zone (DMZ) Control Standards"
Answer the following question
• Analyze the IT infrastructure assets that are commonly located in the DMZ. Determine how the types and size of the organization impact the structure of the DMZ.
• Propose at least three policies that organizations need to implement for traffic flowing into the DMZ or out of the DMZ.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.