Risk Analysis
The consequences of a mobile device being compromised by an attacker range from small to huge depending on the level of severity the impact that has on the intended recipient. Some examples include but are not limited to; personal and professional data being removed, operation of the device being rendered unusable, total battery discharge, stealing of user’s identity, recording of conversations, and manipulating smartphones to act as zombie machines.
Assumptions Some common assumptions in mobile device security are that new smartphones and tablets are safe and have the current up to date operating systems installed. Passwords are inconvenient in that they slow down device use. Platform security is 100% secure at all times. The user does not make any mistakes or will not have any accidents with their mobile devices. All applications are trustworthy and legitimate. The data contained within mobile devices is always recoverable. Cybercriminals are not interested in users’ and are instead focused on targeting businesses. A last assumption would be that all Wi-Fi connections are safe and secure. Limitations Security measures are primarily gained through having a combination of knowledge and experience in dealing with mobile device security. The implementation of security solutions can be hard to correlate between a mobile device and a personal computer. Personal computer use antivirus and firewall as a means of security while mobile devices is not possible.
The CSO or CIO should establish policies as to what data is allowed to be stored on mobile devices, what level of protection is required, and what access to internal systems various mobile devices can have. Regularly, these policies are part of the overall data management and access management policies. The network administrator and IT manager usually decide on which tools to use to ensure that password, virtual private network, access control, and malware protection requirements are followed. They may also decide on which types of mobile devices are authorized for use with company data and services. Managers and users are responsible for following these policies. It is tempting for employees to use personal devices with forbidden data and
The supporting evidence needed to properly have functional operational for security and it may come in several operational factoring of factors such as information Integrity, Personal Integrity, Company Integrity and just the normal notion the device integrity acknowledged as Android or Blackberry. The two devices that function may have their information in harm’s way by data usage on both devices. This information can be damaged in one or more ways named as risk or attack.
However mobile devices also represent a significant risk to information security and data security as, if the appropriate security applications and procedures are not applied, they can be a conduit for unauthorized access to the Eastern Widgets’ data and IT infrastructure. This can subsequently lead to data leakage and system infection. Eastern Widgets has a requirement to protect its information assets in order to safeguard its customers, intellectual property and reputation. This policy outlines a set of practices and requirements for the safe use of mobile devices.
Human factors influence polices in the BYOD practice in the workplace because for the most part employees are comfortable and prefer using their own devices compared to company issued devices as they can often multitask between personal and business access. The use of mobile devices comes with the consequences of the device being stolen, lost and exposed to threats. The possibility of these devices falling in the wrong hands or stranger not authorized access to data could result to harmful software application being uploaded or downloaded which could infect the device and compromise the network.
Accidents to your iphone don't need to be a nuisance or hard on the wallet when you provide the best protection for your phone. Whether it's shatterproof boxes like the Otterbox styles, or screen coverings to protect scratches on your phone, Amazon's rugged cases are made of high tech materials like polycarbonate that stand up to tough falls, and protect the back and sides of your phone. Pixel Skins and similar casing are soft and rubbery, and slide off and on
This case study compares desktop PCs to mobile devices in terms of cyberterrorism. The authors make the conclusion that cybercrimes can be deployed using modern day cellphone through web 2.0 applications. This study solidifies mobile security concerns.
Protection of attack, damage, or unauthorized access is necessary with the increase of mobile users, digital applications
Many companies in United States and around the world have started to worry about the iPhone usage and how much they are becoming dependent by organizations in order to conduct their business. Landman (2010) stated, “The threat from accidental or malicious misuse by employees is a significant threat to business” (p. 14). For this reason, using an iPhone in the workplace is putting companies on alert because the owner of the iPhone can store volatile information about their place where they work. Any information about the company such as e-mails, photos, and other digital evidence used in the work place could be sent to their competitors and used against the company itself and these are real life dangers in the corporate world.
Smartphones are a ripe target for hackers for several reasons, one is that smartphones have limited security and antimalware protection. Second malware creators can access email and contact lists, monitor personal communications, and capture vital data such as
The security implications are that the devices could become lost and stolen. A smartphone is easily accessible because you can carry it anywhere which gives the opportunity to be as easily stolen. It also easier to hack into the network of mobile devices. They can easily circumvent passwords or locks and get access to encrypted data. Getting access to a device can lead to data that is confidential and sensitive such as emails. Since the mobile device is carried everywhere, people are using their personal devices in the workplace which is, even more, date from the workplace that could be accessed by hackers. It is used daily to shop, make banking transactions, and paying bills. The accessibility of mobile devices makes huge risks of security.
Cell phone communication is not completely secure but the risk depends on a variety of variables, user habits, interception points, and user vigilance.
Phones hold critical information such as: addresses, phone numbers, pictures, account information and much more. Mobile phones are considered high risk when it comes to information leakage. According to Forbes , Six of the worlds seven billion people have mobile phones with access to the internet. Cyber attacks can happen at any time and any place, even from the comfort of your own home. Malware, (which is a software that is intended to damage or disable computer systems) is now an easy detection for most computer security
REPORT ON ICT INFRASTUCTURE, EFFECTIVE IMPLEMANTION OF MOBILE APPLICATION WITH ANY OPERATTING SYSTEM WITH SECURITY FEATURES AND COSTING
New technology has spurred innovative ways to spend money. As mobile payment systems continually develop, consumer financial and personal information risk exposure. Industry officials state the technology is growing, but security specialists argue growth of will inevitably attract fraud. Smartphone owners must treat their phones as a miniature computer and equip proper anti-virus and malware software. Enacting preventative methods will help thwart security breaches over mobile networks. (Ladendorf, 2013)
Thesis; Along with the efficiency mobile devices render, come along its risks, in which raises substantial security and privacy concerns. It’s important to be aware of the possible threats a mobile can have, along with knowing what and how to secure information, as well as trying to prevent threats from happening.