Managing electronic transactions through mobile devices

Assignment Help Basic Computer Science
Reference no: EM131610090

Application: Managing Electronic Transactions Through Mobile Devices

Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not properly secured, can cause great damage to the user and to the user's organization.

Consider the following scenario: You are the manager of IT for a fast growing company. The company plans to take advantage of cutting edge technology as one of its competitive approaches to gain market share. It is planning to equip its sales people with mobile devices to take orders from customers. In addition, it is planning to enable its delivery and installation people to process credit card payments from customers upon delivery and installation of the systems, through a wireless credit card payment processing system.

The company recognizes that there are security issues related to electronic transactions using mobile devices. Every time an employee submits a transaction, the information is transferred from the mobile device to the appropriate department over an Internet connection. The company is also concerned that the personal use of company mobile devices will put them at greater risk of malware and other forms of compromise. Loss of sensitive consumer information can result in loss of reputation and potentially lead to legal actions against the company.

The Chief Information Officer (CIO) of the company has asked you to find a way to use mobile devices, in a secure way, to prevent data leakage.

For this Assignment, based on your readings and through additional research, develop a 4- to 6 page proposal that describes and evaluates applicable security management solutions for the company. Include the following points:

  • Explain the security threats the employees' mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.
  • Based on the best practices for mobile security, describe which of these countermeasures you believe would be most effective. Justify your choices.
  • Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to implement the solution.

Reference no: EM131610090

Questions Cloud

What is the current intrinsic value of marine oils stock : What are Marine Oils’ cost of equity and weighted average cost of capital? What is the current intrinsic value of Marine Oils’ stock?
Difference between a wan and a lan : What do you think is a WAN, and from the reading what is the difference between a WAN and a LAN?
Critical thinking to the issue of health care : Critical thinking to the issue of health care.please discuss this issue and your critical thinking about it. Is health care a right for all people?
Differences between cam and tcam : What are the differences between CAM and TCAM? Given the choice of choosing a switch with CAM table or a switch with TCAM table, which one would you choose?
Managing electronic transactions through mobile devices : Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere.
Need to buy eight times her after tax income : She calculates that she will need to buy eight times her after tax income. Her annual income is $40,000 and her federal tax bracket is 15%
Create two employee objects and display object yearly salary : (Employee Class) Create a class called Employee that includes three pieces of information as data members-a first name (type string), a last name.
Corporate privacy and the privacy of individuals : With today's computers, the right to privacy is an especially challenging problem. Corporate privacy and the privacy of individuals is a major concern.
Discuss five skills required for effective patients care : Review your strength from the Allied Health course. for the activity, define Affective skills and list five skills required for effective patients Care

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a program in c++ for a server

Write a program in C++ for a server (called math solver) which solves three math problems: factorial (i.e. n!), exponent with base 2 (i.e. 2n), and cube (i.e. n3).

  Implement a similar method in the photopost class

Try out your solution by creating a MessagePost object. Implement a similar method in the PhotoPost class.

  Show the primary and foreign keys for each entity

Create an ERD that represents the entities, attributes, the relationships between entities, and the cardinality and optionality of each relationship that are described by this business rule.

  Database while planning the data types

Create these tables in your database while planning the data types for each of these fields. Generate the ERD for the tables using SQL Developer and take a screenshot of this to place into MS Word. Provide the SQL Script that shows you have created a..

  Give examples of 4 vertices and 6 vertices degrees graph

If possible, give examples of: a) A graph with 4 vertices whose degrees are 1, 2, 3 and 3. b) A graph with 6 vertices whose degrees are 2, 4, 3, 3, 4 and 5. If it is not possible, explain why.

  Common and special symbols for flowcharts

What are the common and special symbols for flowcharts? Discuss the importance and application of flowcharts.

  Compute the number of different possible ways

Compute the number of different possible ways in which the instructions of the two processes can be interleaved when the two processes are executed concurrently.

  What is the importance of the fast fourier transform

Why should the interpolation data abscissae xi in Section 13.2 not include both i = 0 and i = 2l?

  Specify how you will enforce minimum cardinality

Document your minimum cardinality enforcement using referential integrity actions for a required parent, if any, and the form in Figure 6-28(b) for a required child, if any.

  Industrial chemicals are evil and is this correct

Why do we tend to assume that natural chemicals are safe but industrial chemicals are evil and is this correct?

  Write the definition of a class counter containing

Write the definition of a class Counter containing: An instance variable named counter of type int An instance variable named limit of type int . A constructor that takes two int arguments and assigns the first one to counter and the s..

  Create a formal code of ethics for it

Suppose you have just joined a large financial services company as the head of IT and are asked to create a formal code of ethics for IT. What steps would you take to research this, and what resources would you consider?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd