Question: Imagine this scenario: Your Learning Team is a cybersecurity engineering team for a financial services company that sells investments to, and manages investment portfolios for

  • Imagine this scenario: Your Learning Team is a cybersecurity engineering team for a financial services company that sells investments to, and manages investment portfolios for high net-worth individuals.
  • Your organization just completed the migration of the account managers to a cloud-based, customer relationship management (CRM) software application. Your organization has integrated the cloud-based CRM with on-site investing and account-management systems to improve investment-product sales to existing and potential customers and for managing customer accounts and investment portfolios. Account managers are excited to use the new system, especially since it supports mobile device access.
  • Management hopes the new cloud-based CRM, integrated with the on-site software applications that manage customer accounts and investment portfolios, will help the organization generate more leads, increase sales, improve customer service, reduce the cost of sales for the organization, and increase revenue.
  • Your organizations chief information security officer (CISO) is concerned about the new systems security and its integration to existing systems.
  • As a team, write a 4- to 6-page security analysis for the CISO in which you:
    • Create a plan that addresses the secure use of mobile devices by internal employees and external employees as they use mobile devices to access these applications.
    • Recommend physical security and environmental controls to protect the data center that runs the on-site applications.
    • Analyze cryptography and public key infrastructure (PKI) uses which could be used to increase security for the systems.

Need help with part that is bold and underlined, please.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!