1. Explain the security threats the employees mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.
2. Based on the best practices for mobile security, describe which of these counter measures you believe would be most effective. Justify your choices.
3. Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to implement the solution.