Great damage to the user

Assignment Help Basic Computer Science
Reference no: EM131029615

Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not properly secured, can cause great damage to the user and to the user's organization.

Consider the following scenario: You are the manager of IT for a fast growing company. The company plans to take advantage of cutting edge technology as one of its competitive approaches to gain market share. It is planning to equip its sales people with mobile devices to take orders from customers. In addition, it is planning to enable its delivery and installation people to process credit card payments from customers upon delivery and installation of the systems, through a wireless credit card payment processing system.

The company recognizes that there are security issues related to electronic transactions using mobile devices. Every time an employee submits a transaction, the information is transferred from the mobile device to the appropriate department over an Internet connection. The company is also concerned that the personal use of company mobile devices will put them at greater risk of malware and other forms of compromise. Loss of sensitive consumer information can result in loss of reputation and potentially lead to legal actions against the company.

The Chief Information Officer (CIO) of the company has asked you to find a way to use mobile devices, in a secure way, to prevent data leakage.

For this Assignment, based on your readings and through additional research, prepare a 4- to 6-page proposal that describes and evaluates applicable security management solutions for the company. Include the following points:

  • Explain the security threats the employees' mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.
  • Based on the best practices for mobile security, describe which of these countermeasures you believe would be most effective. Justify your choices.
  • Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to
  •  implement the solution. 
  • Include references in an APA format. 

Reference no: EM131029615

Questions Cloud

Prove that if a real number y satisfies : Prove that if a real number y satisfies 0
Write an essay about international business : Write an essay about International Business. Also Write about experiences what made you to choose international business. Compliance: Has the writer followed all instructions for the assignment?
The details of material stocked in a company : The details of material stocked in a company are given below with the unit cost and the an consumption in Rs. Classify the material in to Aclass, Bclass and Cclass by ABCanalysis. S.No. Item Code No. Annual consumption in pieces Unit price in Paise.
Estimate the citys full cost of fire department labor : Estimate the city's full cost of fire department labor during the fiscal year assuming no change in staffing. Separate that cost into salary and fringe-benefit components.
Great damage to the user : Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not prope..
During what times is its acceleration negative : draw three separate graphs for acceleration, velocity and displacement. Explain the relationship between the important information on the graphs.
How article might or might not be useful to your research : A one-paragraph summary of the article that integrates a minimum of two quotes that are cited properly within the style of your discipline. A one-paragraph analysis of how the article might or might not be useful to your research.
How much did he spend each day : A hungry college student goes to the cafeteria and buys lunch. The next day he spends twice as much. The third day he spends $1 less than he did the second day. At the end of 3 days he has spent $35. How much did he spend each day? Use MATLAB's s..
The cost of ordering and transportation : You have to supply your customer 100 units of certain product every Monday and only on Monday. You obtain the product from a local supplier at Rs/ 60/- per units. The cost of ordering and transportation from the supplier are Rs. 150/- per order.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Laser printer and inkjet printer

Identify the make and model of one (1) laser printer and one (1) inkjet printer that are similarly priced. Evaluate the quality of each in terms of print speed (i.e., pages per minute), resolution (i.e., dots per inch), memory, color capability, d..

  Calculate delay in network and data loss

For a 1-Gbps network operating over 5000 km, the delay is the limiting factor, not the bandwidth. Consider a MAN with the average source and destination 20 km apart.

  What role did the church play in the daily lives

What role did the church play in the daily lives of the medieval public andWhere these characters truly concerned about religion above all else during the spiritual pilgrimage described

  The shipping charge on a purchase

The shipping charge on a purchase of $234.65 is $5.00.

  What is netwitness visualizer

What is Netwitness Visualizer. How can it play a role in a Cybercrime investigation?

  Write out that induction proof explicitly

Write out that induction proof explicitly, and also show explicitly how the invariant implies that the greedy satis?ability algorithm is correct.

  Incorporate this method into an application

Incorporate this method into an application that inputs a series of pairs of integers (one pair at a time) and determines whether the second value in each pair is a multiple of the first

  Briefly describe the data collection techniques

Briefly describe the data collection techniques. Did the researcher use appropriate data collection techniques (qualitative and/or quantitative) to answer the study's research questions

  How long will it take for the country mineral reserves

If this is so, how long will it take for the country's mineral reserves to be depleted? Solve using Excel.

  How many kegs of nails should low order at one time

Using the EOQ method, how many kegs of nails should Low order at one time? EOQ = square root 2DB/IC.

  Backoff algorithm for contention

Two CSMA/CD stations are each trying to transmit long (multiframe) files. After each frame is sent, they contend for the channel, using the binary exponential backoff algorithm.

  Describe the considerations

Describe the considerations that organizations and investigators must take into account when determining the appropriate tools to use, while knowing that the tool will be used to support legal proceedings.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd