Managing electronic transactions through mobile devices

Assignment Help Basic Computer Science
Reference no: EM131171500

Application: Managing Electronic Transactions Through Mobile Devices

Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not properly secured, can cause great damage to the user and to the user's organization.

Consider the following scenario: You are the manager of IT for a fast growing company. The company plans to take advantage of cutting edge technology as one of its competitive approaches to gain market share. It is planning to equip its sales people with mobile devices to take orders from customers. In addition, it is planning to enable its delivery and installation people to process credit card payments from customers upon delivery and installation of the systems, through a wireless credit card payment processing system.

The company recognizes that there are security issues related to electronic transactions using mobile devices. Every time an employee submits a transaction, the information is transferred from the mobile device to the appropriate department over an Internet connection. The company is also concerned that the personal use of company mobile devices will put them at greater risk of malware and other forms of compromise. Loss of sensitive consumer information can result in loss of reputation and potentially lead to legal actions against the company.

The Chief Information Officer (CIO) of the company has asked you to find a way to use mobile devices, in a secure way, to prevent data leakage.

For this Assignment, based on your readings and through additional research, prepare a 4- to 6-page proposal that describes and evaluates applicable security management solutions for the company. Include the following points:

  • Explain the security threats the employees' mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.
  • Based on the best practices for mobile security, describe which of these countermeasures you believe would be most effective. Justify your choices.
  • Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to implement the solution.

Reference no: EM131171500

Questions Cloud

Evaluates the continuing need for independent directors : Prepare a report for your fellow students that: describes the current Australian recommendations for the inclusion of independent directors in a board of directors, evaluates the continuing need for independent directors
What average price change per year : An economist has predicted that for the next 5 years, the U. S. will have an 8% annual inflation rate, followed by 5 years at a 6% inflation rate. This is equivalent to what average price change per year for the entire 10-year period?
Calculate the mass of air that has leaked in : Calculate the mass of air that has leaked in and the quantity of vapour that has condensed. Take the barometric pressure as 760 mm
Explain how the attentional blink relates to attention : Explain how the attentional blink relates to attention. Analyze how the variation in time influences the probability of seeing the second target letter. Explain the circumstances under which the attentional blink can be eliminated.
Managing electronic transactions through mobile devices : Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not pr..
Analyze human right issue presented by pharmacares treatment : Analyze the human rights issues presented by PharmaCARE's treatment of the Colberia's indigenous population versus that of its executives.
What you are going to market about yourself : 1. What you are going to market about yourself 2. Who you are going to market yourself to
Continuing the design of solution for ecpi emr : You are continuing the design of your solution for ECPI EMR. Use Microsoft Word (via XenDesktop if necessary). ECPI EMR has one central IT infrastructure office, with components of the Active Directory distributed through four other locations. Cond..
Calculate the tana of air and vapour present initially : The air in a cylinder fitted with a piston is saturated with water vapour. The volume is 0.3 m3. the pressure is 3.5 bar and the temperature is 60.1°C.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Analysis on the viability of upgrading to windows

Develop a SWOT analysis on the viability of upgrading to Windows 8 for the organization as a whole. Provide a detailed upgrade plan for the organization, including the sales staff. At a minimum:

  Management information systems

Discuss the pros and cons of selecting (outsourcing to) three different vendors to handle three different IT/IS activities.

  Determining accurate formula using undetermined coefficients

Determine a more accurate formula for f'(t) using method of undetermined coefficients. Let's say the formula is of the form f'(t)= Af(t + 2h) + Bf(t + h) - Bf(t - h) - Af(t - 2h).

  Describe where to apply continuum mechanics

Mechanics of material modelled as continuum is called Continuum Mechanics. Where can you apply continuum mechanics? Continuum mechanics has been successfully applied to solids.

  Austraria or a major river in another country

students are to write a retter home to their parents expraining the water crises and arguing for or against the use of recycled water.GEOGRAPHY:

  Convert the decimal integer

Convert the decimal integer -24 to 16 bit and 32 bit two's complement hexadecimal representation. show your calculations.

  Provide a money transfer system using sms technology

Instructions: Your financial firm has a contract to provide a money transfer system using SMS technology for a global retail outlet chain. You have been selected to create a draft security policy for the new system utilizing the CIAA strategy. ..

  Why information security is not factor for organization

But would not require to give for information security on those systems. Explain that environment and desribe why information security is not factor for that organization.

  Pipeline diagram for processor which has no forwarding

If the processor has no forwarding, how many cycles will one loop iteration take? show a pipeline diagram to support your answer.

  Look for the actual location

The client says that this photo will help to clear him or her of the investigation. You need to determine the date, time, and location of the photo. Look for the actual location (not the GPS coordinates, but you'll need to use those to find the lo..

  Convey the meaning of the poem? chat conversation end

Write Poem Analysis essay, Works Cited, and Copy of Poem (with line numbers). Also, copy and paste your entire essay into the body of the thread. Essay: 3 pages in MLA format,use 3-5 in-text (short) citations and 1-2 block (long) quotations. You also..

  What circumstances is static allocation

Under what circumstances is static allocation for a local permissible?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd