Reference no: EM133516700
Case Study: Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not properly secured, can cause great damage to the user and to the user's organization.
Consider the following scenario: You are the manager of IT for a fast growing company. The company plans to take advantage of cutting edge technology as one of its competitive approaches to gain market share. It is planning to equip its sales people with mobile devices to take orders from customers. In addition, it is planning to enable its delivery and installation people to process credit card payments from customers upon delivery and installation of the systems, through a wireless credit card payment processing system. The company recognizes that there are security issues related to electronic transactions using mobile devices. Every time an employee submits a transaction, the information is transferred from the mobile device to the appropriate department over an Internet connection. The company is also concerned that the personal use of company mobile devices will put them at greater risk of malware and other forms of compromise. Loss of sensitive consumer information can result in loss of reputation and potentially lead to legal actions against the company.
The Chief Information Officer (CIO) of the company has asked you to find a way to use mobile devices, in a secure way, to prevent data leakage. Based on your readings and through additional research, try to prepare a proposal that describes and evaluates applicable security management solutions for the company. Include the following points:
Question 1. Explain the security threats the employees' mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.
Question 2. Based on the best practices for mobile security, describe which of these countermeasures you believe would be most effective. Justify your choices.
Question 3. Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to implement the solution.
Discuss the implications of the findings in the context
: Describe the literature review process, including search strategies, inclusion/exclusion criteria, and analysis techniques. Discuss the implications
|
Develop a working thesis
: ENG 1252- Develop a working thesis. You are focusing on HOW the author writes, not WHAT she writes. Your thesis should be arguable, specific, and supportable.
|
Ethical standards were adhered
: The first needs to show where ethical standards were adhered to before, during, and after the profiling process.
|
Define specific elements of this type of human trafficking
: Define the specific elements of this type of human trafficking including, key traits of the type of human trafficking, demographic of the population effected,
|
Explain the security threats the employees mobile devices
: Explain the security threats the employees' mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.
|
Ethnic and racial groups have formed organized crime
: Asian Organized Crimes: How did the tongs come into existence? What other ethnic and racial groups have formed organized crime organizations
|
Provide three pieces of evidence showing that your scripts
: Provide three pieces of evidence showing that your scripts were successful: 1) a copy of your scripts; 2) clear screenshots of the Task Scheduler interface show
|
Criminal proceedings regarding boston marathon bombing
: Explain how criminalistics directly impacted the outcome of the criminal proceedings regarding the Boston Marathon Bombing
|
Describe ways school counselors can leaders at school site
: Describe four ways school counselors can be leaders at their school site. Describe the elements in the ASCA model that pertain to school counselor leadership.
|