Explain the goal of information security in relation to mobile devices.
Identify the three sources of threats, provide a summary of each, and provide at least one example of each.
Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.
Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.
Explain human safeguards, and discuss which human safeguard(s) should be implemented.
Discuss why the organization needs an incident response plan to secure information and knowledge.