The sales division within a large organization purchased touch screen tablet computers for all 250
sales representatives in an effort to showcase the use of technology to its customers and increase
productivity. This includes the development of a new product tracking application that works with
the new platform. The security manager attempted to stop the deployment because the equipment
and application are non-standard and unsupported within the organization. However, upper
management decided to continue the deployment. Which of the following provides the BEST
method for evaluating the potential threats?
A.
Conduct a vulnerability assessment to determine the security posture of the new devices and
the application.
B.
Benchmark other organization’s that already encountered this type of situation and apply all
relevant learning’s and industry best practices.
C.
Work with the business to understand and classify the risk associated with the full lifecycle of
the hardware and software deployment.
D.
Develop a standard image for the new devices and migrate to a web application to eliminate
locally resident data.