Thursday, May 14, 2020

Mobile Device Security Threats - 1184 Words

Mobile device security Threats: Over the past two decades, we have witnessed significant technology advances in mobile devices, from the personal data assistants (PDAs) of the late 1990s and early 2000s to the ubiquitous and multifunctional smartphones of today. These advances have extended the virtual boundaries of the enterprise, blurring the lines between home and office and coworker and competitor by providing constant access to email, enabling new mobile business applications and allowing the access to, and storing of, sensitive company data. Mobile devices, such as smartphones and tablets, proliferate in today’s corporate environments. While there are significant opportunities to leverage these devices to increase the†¦show more content†¦However, an attacker can easily bypass incorrect, insufficient or weakly implemented controls, thereby leveraging the internal network’s trust in the device. For example, BlackBerry devices supported by the appropriate version of BlackBerry Enterprise Server can act as modems for a laptop to access the intranet. This would bypass some device restrictions and allow a malicious user to attack the internal network from the much more functional platform of a PC. †¢ Stolen or lost devices A fundamental problem of mobile devices is physical access control.By their design, mobile devices are most useful outside of the office and on the move with the owner. This presents several concerns for a security administrator, as the device on the move is more likely to. After going thru these threats, I personally recommend these solutions: †¢ Network accessibility Commercial applications or custom-developed applications are used to connect to common services on the internal corporate network to test the availability of internal web servers, FTP servers, database servers and other critical infrastructure. These tests also establish connections to internal web applications that should be inaccessible to the device. The existing web browsers and proprietary web application testing tools are used to circumvent access controls. †¢ Policy configuration With regard to policy configuration, the local device policies determine whetherShow MoreRelatedMobile Devices : Mobile Device Security Threats1747 Words   |  7 Pages1. Introduction Usage of mobile devices, such as smartphones and tablets, has surpassed desktop and laptop computers in this day and age. These devices are being used for applications like banking, personal digital assistance, remote working, m-commerce, Internet access, entertainment and medical usage [2]. Also, recent innovations in mobile commerce have enabled users to conduct many transactions from their smartphone, such as purchasing goods and applications over wireless networks, redeemingRead MoreMobile Device Security And Other Threats1304 Words   |  6 PagesMobile Device Security and Other Threats Darryl Gennie Dr. Bouaffo Kouame Augusta CIS 502 28 February 2016 Strayer University â€Æ' Security threats have not only grown and matured quickly, but the people behind these threats have become more creative in disguising and hiding their work. These criminals have become more adept at eluding their identification and are now relying on cryptography. Some of the more frequent used threats were listed in the Security Threat Report 2014 such asRead MoreThe Impact of Mobile Devices on Cyber Security1132 Words   |  5 PagesThe Impact of Mobile Devices on Cyber security: The modern society including corporate environments has been characterized by the proliferation of mobile devices. The increased use of these devices is attributed to the significant opportunities they bring and their contribution towards enhanced communication. However, the increased use of mobile devices has been accompanied by considerable concerns regarding the privacy of personal information and sensitive corporate data that are stored on themRead MoreEssay about Annotated Bibliography on Information Technology768 Words   |  4 Pageson Information Technology Mobile Security in the Future Adesina, A. O., Agbele, K. K., Februarie, R., Abidoye, A. P., amp; Nyongesa, H. O. (2011). Ensuring the security and privacy of information in mobile health-care communication systems. South African Journal of Science, 107(9), 26-32. This research article examines the security concerns of using mobile technology systems in health care institution. Various methods of ensuring privacy and security of patient’s electronic medicalRead MoreMobile Devices And The Business Environment1491 Words   |  6 Pages Securing Mobile devices in the Business Environment: Introduction: Today,mobile devices are becoming important in everyone’s life and these are playing a crucial role in peoples life and work.smart phones and tablets are used by people as work tools in place of desktops.Now-a-days,there is a rapid increase of usage of mobile devices in business and enterprises for their growth.Features of mobile devices is changing a lot and because of those some features threats are also increasing.securityRead MoreSmartphones And Other Mobile Devices1630 Words   |  7 Pagessmartphones and other mobile devices are playing a greater central role in how people are entertained, communicate, network, work, bank, shop, and how employees interact in a corporation. Times are changing and everything is growing within the mobile market--whether in performance, storage, applications, or abilities--have been occurring at an extremely rapid pace. However, there is basic area in which broad time and circumstances in expansion have not been realized on mobile devices, especially whenRead MoreWireless And Mobile Security Plan1584 Words   |  7 PagesRunning head: WIRELESS AND MOBILE SECURITY PLAN Wireless and Mobile Security Plan Patrick C. Behan Regis University Context:  Our networks are becoming more vulnerable because of wireless and mobile computing. Ubiquitous devices can and do pose a significant vulnerability. In this activity, you are to think outside the box and determine how to best defend against these threats. Scenario - You are an Information Security engineer for a midsized company. The company would like to offer directRead MoreTaking a Look at Mobile Risk Management708 Words   |  3 Pagesthat are associated with mobile devices. Mobile Risk management is way beyond traditional management of mobile device where they were primarily working on control tactics and on risk avoidance. The MRM is done to allow their full potential of mobility to exercise while ensuring regulatory compliance and protecting corporate data. In order to achieve accurate balance among risk mitigation, compliance assurance and device management and simultaneously maximizing utility of device and user acceptance thatRead MoreMobile Phones : A Target For Hackers1489 Words   |  6 PagesMobile phones play huge role in our lives as they help us get connected to each other all the time. Since the last decade, Mobile phones continued to evolve into smartphones which can do much more than calling and texting. Smartphones are nothing but computers with extra internal hardware specifically a GSM radio (Global System for Mobile Communications) and a baseband processor that controls the radio. Along with these primary hardware components, smartphones now comes embedded with additional hardwareRead MoreMobile Device Security Concerns For Android Powered Mobile Devices Essay1234 Words   |  5 Pa gesCurrently, mobile devices have become increasingly essential to every facet of business communication. Smartphones and tablets are becoming the norm in most business environments. As a result of this widespread device proliferation, mobile device security now needs to be a primary concern for information security personnel in any organization. Increasingly, companies are adapting to a BYOD (Bring Your Own Device) policy, in which end user devices are privately owned, rather than owned by the corporation

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.