Great damage to the user

Assignment Help Basic Computer Science
Reference no: EM131029615

Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not properly secured, can cause great damage to the user and to the user's organization.

Consider the following scenario: You are the manager of IT for a fast growing company. The company plans to take advantage of cutting edge technology as one of its competitive approaches to gain market share. It is planning to equip its sales people with mobile devices to take orders from customers. In addition, it is planning to enable its delivery and installation people to process credit card payments from customers upon delivery and installation of the systems, through a wireless credit card payment processing system.

The company recognizes that there are security issues related to electronic transactions using mobile devices. Every time an employee submits a transaction, the information is transferred from the mobile device to the appropriate department over an Internet connection. The company is also concerned that the personal use of company mobile devices will put them at greater risk of malware and other forms of compromise. Loss of sensitive consumer information can result in loss of reputation and potentially lead to legal actions against the company.

The Chief Information Officer (CIO) of the company has asked you to find a way to use mobile devices, in a secure way, to prevent data leakage.

For this Assignment, based on your readings and through additional research, prepare a 4- to 6-page proposal that describes and evaluates applicable security management solutions for the company. Include the following points:

  • Explain the security threats the employees' mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.
  • Based on the best practices for mobile security, describe which of these countermeasures you believe would be most effective. Justify your choices.
  • Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to
  •  implement the solution. 
  • Include references in an APA format. 

Reference no: EM131029615

Questions Cloud

Prove that if a real number y satisfies : Prove that if a real number y satisfies 0
Write an essay about international business : Write an essay about International Business. Also Write about experiences what made you to choose international business. Compliance: Has the writer followed all instructions for the assignment?
The details of material stocked in a company : The details of material stocked in a company are given below with the unit cost and the an consumption in Rs. Classify the material in to Aclass, Bclass and Cclass by ABCanalysis. S.No. Item Code No. Annual consumption in pieces Unit price in Paise.
Estimate the citys full cost of fire department labor : Estimate the city's full cost of fire department labor during the fiscal year assuming no change in staffing. Separate that cost into salary and fringe-benefit components.
Great damage to the user : Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not prope..
During what times is its acceleration negative : draw three separate graphs for acceleration, velocity and displacement. Explain the relationship between the important information on the graphs.
How article might or might not be useful to your research : A one-paragraph summary of the article that integrates a minimum of two quotes that are cited properly within the style of your discipline. A one-paragraph analysis of how the article might or might not be useful to your research.
How much did he spend each day : A hungry college student goes to the cafeteria and buys lunch. The next day he spends twice as much. The third day he spends $1 less than he did the second day. At the end of 3 days he has spent $35. How much did he spend each day? Use MATLAB's s..
The cost of ordering and transportation : You have to supply your customer 100 units of certain product every Monday and only on Monday. You obtain the product from a local supplier at Rs/ 60/- per units. The cost of ordering and transportation from the supplier are Rs. 150/- per order.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate a checksum that is the modulo 8 sum

How do you calculate a checksum that is the modulo 8 sum of all the bytes in the following packet C4 04 03?

  Establishing a performance measurement baseline

Establishing a Performance Measurement Baseline

  Write a python programs to solve

Write a Python programs to solve the following. Scientist measure an object's mass in kilograms and its weight in newtons. The equation is weight = mass * 9.8.

  Smart phone secure

What steps can individuals and businesses take to make their smart phone secure?

  Translate the first instruction into english

If the machine is started with its program counter containing 00, what bit pattern is in register 6 when the machine halts?

  What does n-tier architecture mean

What does N-tier architecture mean? Describe the purpose of the Presentation Layer, Business Layer, and Data Layer

  Laser printer and inkjet printer

Identify the make and model of one (1) laser printer and one (1) inkjet printer that are similarly priced. Evaluate the quality of each in terms of print speed (i.e., pages per minute), resolution (i.e., dots per inch), memory, color capability, d..

  Increasing the number of cpus in a computer system tends to

increasing the number of cpus in a computer system tends to increase system performance. there are different types of

  Deliverable associated required to complete process

Explain in scholarly detail department expense predicting processes and deliverable associated required to complete process.

  Explain why there is a chance that the social security trust

1. Explain why there is a chance that the social security trust fund may be depleted by 2035. Does this mean that social security will be bankrupt and will not be able to make any payments to retirees after 2035?2. Consider the savings-investm..

  The function return the value of the ticket price

The function return the value of the ticket price time the discount percentage.

  What are the goals of lawmakers in the public sector

Describe some likely instances that demonstrate when the gathering of meta-data by businesses within this example industry may not be good for the customer. Use citations to support your arguments about how some action or result related to collec..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd