1. Background information Imagine that you have been employed as an information security analyst in an information security consulting company, Cyber Securitus. Following some recent news stories about risks associated with

the use of certain mobile devices and applications, the CEO at a local organization has asked Cyber Securitus for advice about the mobile device used by one of the employees at their organization. You and your team have been assigned the task of investigating information security issues associated with that mobile device and providing advice to the client in the form of a risk advice report. You will begin the report and submit a partially completed version to your supervisor for review (Part A sub- mission) and take the supervisor feedback into consideration when completing your report (Part B submission).