Respond to the following in a minimum of 250 words (refer to Research Materials below and course materials):
Mobile devices are used by employees throughout the day, whether it is placing calls, accessing company files and databases, or sending instant messages to coworkers and clients. Mobile devices also present significant security risks.
Describe two enterprise mobile device polices (BYOD, CYOD, COPE, and COBO) and the advantages, disadvantages, and security risks for each.
Describe how you would design security for each type your selected. Include both device protection and data center protection.
Research Materials
https://www.enterprisemobiletoday.com/features/byod-mobile-policies.html
https://www.enterprisemobiletoday.com/features/cyod-mobile-policies-enterprises.html
https://www.enterprisemobiletoday.com/features/cope-mobile-policies-enterprises.html
https://www.enterprisemobiletoday.com/features/cobo-mobile-policies.html
https://resources.infosecinstitute.com/topic/securing-remote-access/
https://resources.m-files.com/blog/the-top-7-risks-involved-with-bring-your-own-device-byod-3