What new standards should be adopted for penetration testing to assess vulnerability for mobile devices in the growing BYOD (Bring Your Own Device to work) environment?


Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1490

Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1495

What new standards should be adopted for penetration testing to assess vulnerability for mobile devices in the growing BYOD (Bring Your Own Device to work) environment?


Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1490

Notice: Trying to access array offset on value of type bool in /home/onliiuxo/public_html/wp-content/themes/betheme/functions/theme-functions.php on line 1495

Question 1. As new technology becomes adopted by organizations, standards must also adapt to meet the change. What new standards should be adopted for penetration testing to assess vulnerability for mobile devices in the growing BYOD (Bring Your Own Device to work) environment?

Question 2.One of the biggest risks that companies face is advanced persistent threats. Discuss the most effective way to implement policies that mitigate the chance of an insider either taking part in or facilitating an advanced persistent threat. What policies can help manage the insider threat for an organization’s supply-chain companies, or the organization’s off-shore contractors?

Question 3.

Mandiant released a report alleging that a specific Chinese military unit is behind one of the largest cyber espionage and attack campaigns aimed at American infrastructure and corporations. Public understanding of Advanced Persistent Threats (APT) is weak, attribution remains difficult, and cyberattacks are often dismissed as criminal or peripheral to national security. This carefully-researched report is significant because it convincingly and publicly assigns attribution for ongoing cyber espionage to groups supported by China. By publishing, Mandiant hopes that —
(a) this report will lead to increased understanding and coordinated action in countering APT network breaches; and
(b) its resulting exposure and discussion may thwart APT activities.

After reading the article at the link below and perusing the Mandiant report, discuss whether Mandiant’s two desired outcomes above are likely to occur.
Background:
NYT summary: http://ezproxy.umuc.edu/login?://search.proquest.com/docview/1288537806?
NPR audio: http://www.npr.org/2013/02/19/172431535/report-chinese-government-hackers-behind-dozens-of-attacks-on-u-s-companies