Introduction This task is an investigation of information security issues associated with your personal mobile phone, performed by applying the information security risk management process described in Lecture 3, although in a limited way (not all risks will be identified). Your report on the investigation will have three parts, with three submission points across the semester. The focus of your analysis in each part is as follows: • Part 1 – establishing the context, identifying relevant examples of information security threats and vulnerabilities, and identifying risks to your information. • Part 2 – privacy aspects related to mobile applications, and the associated risks. • Part 3 – countermeasures to mitigate the risks you identified in Parts 1 and 2. Report Structure You will build your report across the semester. When completed, your report will have the following structure: 1. Title page 2. Executive summary 3. Table of contents 4. Introduction 5. Discussion a. Context establishment b. Risk assessment c. Privacy analysis d. Risk treatment and countermeasures 6. Conclusion 7. Recommendations 8. References 9. Appendices
#Sales Offer!| Get upto 25% Off: