Explain the security threats the employees mobile devices

Assignment Help Computer Engineering
Reference no: EM133516700

Case Study: Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not properly secured, can cause great damage to the user and to the user's organization.

Consider the following scenario: You are the manager of IT for a fast growing company. The company plans to take advantage of cutting edge technology as one of its competitive approaches to gain market share. It is planning to equip its sales people with mobile devices to take orders from customers. In addition, it is planning to enable its delivery and installation people to process credit card payments from customers upon delivery and installation of the systems, through a wireless credit card payment processing system. The company recognizes that there are security issues related to electronic transactions using mobile devices. Every time an employee submits a transaction, the information is transferred from the mobile device to the appropriate department over an Internet connection. The company is also concerned that the personal use of company mobile devices will put them at greater risk of malware and other forms of compromise. Loss of sensitive consumer information can result in loss of reputation and potentially lead to legal actions against the company.

The Chief Information Officer (CIO) of the company has asked you to find a way to use mobile devices, in a secure way, to prevent data leakage. Based on your readings and through additional research, try to prepare a proposal that describes and evaluates applicable security management solutions for the company. Include the following points:

Question 1. Explain the security threats the employees' mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.

Question 2. Based on the best practices for mobile security, describe which of these countermeasures you believe would be most effective. Justify your choices.

Question 3. Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to implement the solution.

Reference no: EM133516700

Questions Cloud

Discuss the implications of the findings in the context : Describe the literature review process, including search strategies, inclusion/exclusion criteria, and analysis techniques. Discuss the implications
Develop a working thesis : ENG 1252- Develop a working thesis. You are focusing on HOW the author writes, not WHAT she writes. Your thesis should be arguable, specific, and supportable.
Ethical standards were adhered : The first needs to show where ethical standards were adhered to before, during, and after the profiling process.
Define specific elements of this type of human trafficking : Define the specific elements of this type of human trafficking including, key traits of the type of human trafficking, demographic of the population effected,
Explain the security threats the employees mobile devices : Explain the security threats the employees' mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.
Ethnic and racial groups have formed organized crime : Asian Organized Crimes: How did the tongs come into existence? What other ethnic and racial groups have formed organized crime organizations
Provide three pieces of evidence showing that your scripts : Provide three pieces of evidence showing that your scripts were successful: 1) a copy of your scripts; 2) clear screenshots of the Task Scheduler interface show
Criminal proceedings regarding boston marathon bombing : Explain how criminalistics directly impacted the outcome of the criminal proceedings regarding the Boston Marathon Bombing
Describe ways school counselors can leaders at school site : Describe four ways school counselors can be leaders at their school site. Describe the elements in the ASCA model that pertain to school counselor leadership.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd