Order ID | 6116457138 | |||||||||||||||||
Subject | IT | |||||||||||||||||
Topic | Recommendation Report (Current Situation / Background) | |||||||||||||||||
Type | Coursework | |||||||||||||||||
Writer level | High School | |||||||||||||||||
Style | APA | |||||||||||||||||
Sources / references | 8 | |||||||||||||||||
Language | English(U.S.) | |||||||||||||||||
Description / Paper Instructions
Assignment:
“You are to complete:1- a concise introduction to each of your applications 2- a draft of your background: (at least) three causes, three current issues, and three possible consequences. Each of these – the causes, the current issues, and the possible consequences – need evidence in support. You will also have to explain how the evidence connects to the claim, or how this connects to the company’s situation.”The scenario you have to work on is attached below PS: the instructor asked us to write three questions for the research (about apple’s iPhone and samsung’s galaxy) and i wrote: CTI 300: Spring 2020CCA: Recommendation Report Scenario The CEO of your company, Dr. Hala Al Mansoori, has expressed concern about data security – not just with large systems but with personal mobile devices. You and one or two colleagues will research this issue. In addition, you will compare three possible solutions and recommend one. In this scenario, you are a manager in a data security company (see the CEO’s original memo for details). The CEO has no doubt analyzed the situation; please read the following articles to start your own analysis: From TechWorld, here are the most infamous data breaches:https://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/ HealthIT Security states that 25% of data breaches occur via mobile devices :https://healthitsecurity.com/news/25-of-healthcare-providers-faced-mobile-device-breach-in-2018
An article published byCSO supplies seven mobile security threats to consider: https://www.csoonline.com/article/3241727/7-mobile-security-threats-you-should-take-seriously-in-2019.html
In the words of Stephane Matta:
Considering that DDS is an IT firm, you might see this change in focus to be a bit of a surprise. However, the above articles (and others you will later find) provide plenty of evidence. The three apps you compare may be native (created for a certain device’s operating system), hybrid, or web-based (where they need a certain browser to run). In this case, Dr. Al Mansoori wants to do more than just raise awareness. She states that breaches of all kinds are dangerous. She has requested you to put together a report that researches the issue, targets three possible solutions, and then suggests one based on specific criteria. In addition, she hopes for a basic, low-cost solution to address this issue for her own employees. Along with providing a relevant recommendation, she will eventually want her employees to know how to use it as well. Your CEO wants to get moving on this issue. She has given you a hard deadline for your report of March12th at 11 p.m. Prompt
Please note that some of these apps have a free trial period, after which you must pay. If this happens, have another member of your group sign up after the initial period ends. *If the site asks you for any payment or credit card details upfront, choose another app.
|
https://www.perfectacademic.com/orders/ordernow