Explain the security threats the employees mobile devices

Assignment Help Computer Engineering
Reference no: EM133516700

Case Study: Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not properly secured, can cause great damage to the user and to the user's organization.

Consider the following scenario: You are the manager of IT for a fast growing company. The company plans to take advantage of cutting edge technology as one of its competitive approaches to gain market share. It is planning to equip its sales people with mobile devices to take orders from customers. In addition, it is planning to enable its delivery and installation people to process credit card payments from customers upon delivery and installation of the systems, through a wireless credit card payment processing system. The company recognizes that there are security issues related to electronic transactions using mobile devices. Every time an employee submits a transaction, the information is transferred from the mobile device to the appropriate department over an Internet connection. The company is also concerned that the personal use of company mobile devices will put them at greater risk of malware and other forms of compromise. Loss of sensitive consumer information can result in loss of reputation and potentially lead to legal actions against the company.

The Chief Information Officer (CIO) of the company has asked you to find a way to use mobile devices, in a secure way, to prevent data leakage. Based on your readings and through additional research, try to prepare a proposal that describes and evaluates applicable security management solutions for the company. Include the following points:

Question 1. Explain the security threats the employees' mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.

Question 2. Based on the best practices for mobile security, describe which of these countermeasures you believe would be most effective. Justify your choices.

Question 3. Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to implement the solution.

Reference no: EM133516700

Questions Cloud

Discuss the implications of the findings in the context : Describe the literature review process, including search strategies, inclusion/exclusion criteria, and analysis techniques. Discuss the implications
Develop a working thesis : ENG 1252- Develop a working thesis. You are focusing on HOW the author writes, not WHAT she writes. Your thesis should be arguable, specific, and supportable.
Ethical standards were adhered : The first needs to show where ethical standards were adhered to before, during, and after the profiling process.
Define specific elements of this type of human trafficking : Define the specific elements of this type of human trafficking including, key traits of the type of human trafficking, demographic of the population effected,
Explain the security threats the employees mobile devices : Explain the security threats the employees' mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.
Ethnic and racial groups have formed organized crime : Asian Organized Crimes: How did the tongs come into existence? What other ethnic and racial groups have formed organized crime organizations
Provide three pieces of evidence showing that your scripts : Provide three pieces of evidence showing that your scripts were successful: 1) a copy of your scripts; 2) clear screenshots of the Task Scheduler interface show
Criminal proceedings regarding boston marathon bombing : Explain how criminalistics directly impacted the outcome of the criminal proceedings regarding the Boston Marathon Bombing
Describe ways school counselors can leaders at school site : Describe four ways school counselors can be leaders at their school site. Describe the elements in the ASCA model that pertain to school counselor leadership.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What safe equivalent function should they use to prevent

They see the function, strcpy being called. What safe equivalent function should they use to prevent a buffer overflow?

  How could the company benefit from e-commerce

How could the company benefit from e-commerce? Should it sell its products (all or some) over the web? Should it use its web site primarily to advertise its products and services?

  Organizational decision roles to technology innovation

What competitive advantage does technology give to business? How does aging hardware affect this advantage? What is the importance of organizational decision roles to technology innovation

  Describe the uses of blockchain

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin.

  How to identify online frauds and prevent them from

If you want to protect yourself from online fraud, you must give this article a read. This guide will tell you how to identify online frauds and prevent them

  What is the running time of your method

Describe an efficient way of putting an array list representing a deck of n cards into random order. What is the running time of your method?

  What hyperterminal settings should you use

What are the requirements for using a VTY (virtual terminal) connection to a Cisco device?

  Discuss the transfer of data to and from the cloud is

Assume you are in charge of securing your organization's applications and associated data in the cloud. The transfer of data to and from the cloud is already

  Write a c language program that searches a string

Write a C language program that searches a string for the last occurrence of a specified character

  Find out by watching movies anti trust and social network

Being a good software engineer should not only competent at writing code but also competent. This is for you to find out by watching these two movies:

  Simulate the operation of two of cpu scheduling methods

Write a C++ program to simulate the operation of two of CPU scheduling methods. Get the number of processes from the user.

  Prepare a program that utilizes your computer class

Prepare a program that utilizes your Computer class. The requirements for the program include prompting the user for input, making a calculation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd