Now it is time to develop a mobile security strategy that includes encryption and forensics.
How will you protect your business from viruses and other threats? Access the Unit VI assignment template and address the issues below. (UPLOADED SEPERATELY TEMPLATE)
1. Explain why mobile encryption software is needed.
2. Identify and discuss the encryption software you have chosen to encrypt files and to filter phone and text messages (assume employees have Androids and iPhones). Note: The textbook only discusses software for Androids, so you will need to look elsewhere for information regarding software for iPhones. Suggested websites are available in the Suggested Unit Resources for this unit. (UPLOADED SEPERATELY STUDY GUIDE The resource is located at the bottom of the file)
3. Briefly discuss which forensic process you will use for forensic investigations and explain why (see Unit VI Lesson). If you are unsure about which one to use, you can select the basic computer forensic investigative process (CFIP).
4. Should a mobile device become compromised, identify, and discuss what software tool or tools you will use, and explain why.