Question
1. Background information Imagine that you have been employed as an information security analyst in an information security consulting company, Cyber Securitus. Following some recent news stories about risks associated with the use of certain mobile devices and applications, the CEO at a local organization has asked C