a short review of the different kinds of threats introduced to the information technology environment by integrating mobile computing devices and wireless network access.
In this assignment, while considering the integration of mobile computing devices and wireless network access, be sure to include:
Security Best Practices for maintaining systems and network security
Risk Mitigation Strategies that can be used to enhance the Information Technology environment including the corporate network
Access Control Strategies
Disaster Recovery & Business Continuity protocols
Choose any format to present. Some guidelines are:
APA formatted paper (700 to 1,050 words)
PowerPoint® or other multimedia platform
Other formats as approved by your facilitator