Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assessment 2: Individual Report 2Based on the student’s cases, policies and procedures developed in the first assessment, students are required to select a Mobile Device or Mobile Application...

1 answer below »
Assessment 2: Individual Report 2Based on the student’s cases, policies and procedures developed in the first assessment, students are required to select a Mobile Device or Mobile Application Management system or other suitable solution to implement that policy.Students must choose, and justify their choice of, components, develop appropriate diagrams explaining their solution, and create enrolment guides for administration and end-users. This report is an extension of Assignment 1.Students will examine the technical architectures and feature of iOS/ Android devices, and a Mobile Device Management (MDM) Platform. Which may include architecture (Cloud/On-prem, Enterprise Connector, Authentication, HA, Load-balancing strategy, Profile Payloads, and Configuration).Assignment 1 & 2 will complement each other, the organisation will have a policy, and technical environment to support secure mobile computing.  Assessment Weighting: 30%  Learning Outcomes Assessed: 1 - 5  Due Date: Week 12 - Sunday, 07 June 2020, 11:55 PMIntroductionIn your Assignment 1, you developed use cases and the Policies and Procedures require for the use cases. You are now required to select an MDM or MAM or any other suitable solution to implement your policy.Minimum Requirement1. Explain the rationale for your selected strategy: Bring-your-own-device (BYOD), Chooseyour-own-device (CYOD), Corporate-owned, personally enabled (COPE) or Hybrid approach. 2. For your selected MDM/MAM solution explain, with the help of diagrams, the following:  Architecture (On-Prem, Cloud, Hybrid) and core components  Eligibility and enrolment
Page 2 of 3 Allowed devices - Select a corporate device type or recommend BYO device type if your use case only has BYO users. Justify your selection/recommendation based on devices features, operating system, ecosystem and security.  Security and compliance  Monitoring and management  Device support and maintenance  Choice of Mail Client, authentication method or additional security  Choice of cloud storage and access to contents and files Note: Consider the Profile/Apps/Settings/Restrictions/everything else that needed to be setup on/pushed from MDM to enforce the policiesAssignment FormatProfessional Report, approximately 6-8 pages long, including table of contents, executive summary and references of the report.  Filename: firstname_lastname_A2.docx  Has your full name and number in the footer of every page.  Submitted using Turnitin via Moodle, hence, don’t include a cover sheetMarking criteria and standards:Criteria High Distinction Distinction Credit Pass FailYour rationale for your selected strategyHas shown a clear and solid understanding of the choices you have made in your selected strategyHas given an effective and clear rationale for your selected strategyHas given a good rationale for your selected strategyHas given a basic and general rationale for your selected strategyHas given a brief or unclear rationale for your selected strategy8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%Your critique and analysis of :Has given an effective and comprehensive analysis and specific to the case studyHas given an effective analysis specific to the case studyHas given a good analysis and specific to the case studyHas given a clear analysis but more generalHas given unclear analysis that is not related to the case studyArchitecture (OnPrem, Cloud,8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%
Page 3 of 3Hybrid) and core componentsEligibility and enrolment8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%Allowed devices 8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%Security and compliance8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%Monitoring and management8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%Device support and maintenance8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%Choice of Mail Client, authentication method or additional security8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%Choice of cloud storage and access to contents and files8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%Your structure, layout, format, language, written expression and references of the reportHas used a clear and effective format and layout. Has used clear and professional language.Excellent variety of sources, and citation formats are correct.Has used an effective format and layout. Has used effective language.Excellent variety of sources, and citation formats are correct.Has used a good format and layout. Has used clear and understandable language.Good variety of sources, and citation formats are correct.Has used some kind of format and layout. Has used understandable language.Some variety of sources, and citation formats are correct.Has used an unclear or inconsistent format and layout. Has used some unclear language. Poor variety of sources, and citation formats are incorrect.8.50 to 10.00% 7.50 to 8.49% 6.50 to 7.49% 5.00 to 6.49% 0.00 to 4.99%
Answered Same Day May 26, 2021 Victoria University

Solution

Shikha answered on May 31 2021
145 Votes
Student Name
Student ID        2
ITNET301A Mobile Computing and Security S1 2020
Submitted By
Course
Professo
Date
Table of Contents
1.    Executive Summary    3
2.    Introduction    3
3.    Corporate-owned Policy    3
4.    Architecture    5
5.    Allowed Devices    6
6.    Security and Compliance    6
7.    Monitoring and Management    7
8.    Device Support and Maintenance    7
9.    Choice of Mail Client, Authentication Method or Additional Security    8
10.    Accessing Content and Files    8
11.    Conclusion    8
12.    References    9
1. Executive Summary
In this report, we have considered Sonic Digital Design Pty Ltd. Organization that has developed the corporate owned policy for the mobile devices. These devices will be provided by company only to the sales, marketing staff members. The main objective of this paper is to analyze the architecture as well as monitor the security infrastructure in MDM platform. All the mobile phones will be based on Android operating system whereas other mobile devices like laptops or tablets will be Windows based with latest configuration. These device needs to implement Citrix for secured remote access to the mobile users. The corporate application on these devices will be monitored by IT staff so that any illegitimate vulnerability can be caught at right time.
2. Introduction
MDM (Mobile Device Management) is a wide term that can be used to cover the entire a
ay of employee mobility management and providing better security. This policy can be deployed on the basis of premises or on the basis of hosted service. The main objective of this policy is to develop a common management interface for identifying devices and providing the security on the basis of devices (Tatte & Bamnote, 2013). In assessment 1, we have implemented the Corporate owned policy in Sonic Digital Design Pty Ltd. This assessment is about considering security requirements for corporate owned devices. In this report, we will critically analyze the mobile device management policy.
3. Corporate-owned Policy
The corporate-owned devices exist when the organization is providing mobile phones to their staff to remotely access the company's data. Implementing corporate-owned devices is a significantly progressively uniform and secure way of using a mobile phone for the association to oversee. The main reason for using the corporate-owned device in the organization is to make company data more secured by providing only authorized access of data.
By implementing the corporate-owned devices in the organization, the company can have full control over the device provided to its staff for official use. These devices' security can be easily managed, monitored, and secured with the Mobile Device Management Solution ie MDMS (Richter & Wood, 2016). The main reason for implementing COD policy in the company is as following:
1. Complete Data security: In COD policy, the employees are given mobiles by the company management. In this case, the real security policies can easily be configured and maintained by the IT admin. He can easily apply contingent access and vital utilization guidelines that can ensure the corporate information stored in these phones from being taken, lost or exploited. IT administrator can likewise authorize certain encryption and Wi-Fi framework to fix network security and also avoid any type of cyber threat.
2. Remote Device Management: COD MDM platform can enable the IT administrator to consistently and remotely deal with all devices from the centralized server in real-time. This policy can provide the organization much better authority over all the associated devices over the network system including ioT devices that are being utilized for work purposes. IT administrator can remotely lock or remove the data that is stored in these devices in case of any incident happening.
3. Device Monitoring: It is easy to manage COD with...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here