Case Study:
Mobile OS and Bring Your Own Device (BYOD)"
Please answer the following question:
Question 1: Compare and contrast open-source and closed-source mobile operating systems (OSs), and explain the main reasons why you would consider utilizing one of these types of OSs over the other. Provide at least two reasons to justify your decision.
Question 2: Take a position on whether or not you believe organizations should have a preference on the mobile OS that the user is connecting to its resources (i.e., limiting certain OS from connecting). Justify your response.
"Providing Security Over Data" Please respond to the following:
1) The CIA triad (confidentiality, integrity, and availability) offers three security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the primary means in which each of the three tenets are addressed to mitigate risk and enhance security in your chosen environment.
2) The proliferation of mobile devices to create or access data has had a significant effect on the security concerns surrounding personal and corporate data. From the selected e-Activity article, summarize the attack, and determine the key ways in which you would consider mitigating the threat.