Great damage to the user

Assignment Help Basic Computer Science
Reference no: EM131029615

Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not properly secured, can cause great damage to the user and to the user's organization.

Consider the following scenario: You are the manager of IT for a fast growing company. The company plans to take advantage of cutting edge technology as one of its competitive approaches to gain market share. It is planning to equip its sales people with mobile devices to take orders from customers. In addition, it is planning to enable its delivery and installation people to process credit card payments from customers upon delivery and installation of the systems, through a wireless credit card payment processing system.

The company recognizes that there are security issues related to electronic transactions using mobile devices. Every time an employee submits a transaction, the information is transferred from the mobile device to the appropriate department over an Internet connection. The company is also concerned that the personal use of company mobile devices will put them at greater risk of malware and other forms of compromise. Loss of sensitive consumer information can result in loss of reputation and potentially lead to legal actions against the company.

The Chief Information Officer (CIO) of the company has asked you to find a way to use mobile devices, in a secure way, to prevent data leakage.

For this Assignment, based on your readings and through additional research, prepare a 4- to 6-page proposal that describes and evaluates applicable security management solutions for the company. Include the following points:

  • Explain the security threats the employees' mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.
  • Based on the best practices for mobile security, describe which of these countermeasures you believe would be most effective. Justify your choices.
  • Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to
  •  implement the solution. 
  • Include references in an APA format. 

Reference no: EM131029615

Questions Cloud

Prove that if a real number y satisfies : Prove that if a real number y satisfies 0
Write an essay about international business : Write an essay about International Business. Also Write about experiences what made you to choose international business. Compliance: Has the writer followed all instructions for the assignment?
The details of material stocked in a company : The details of material stocked in a company are given below with the unit cost and the an consumption in Rs. Classify the material in to Aclass, Bclass and Cclass by ABCanalysis. S.No. Item Code No. Annual consumption in pieces Unit price in Paise.
Estimate the citys full cost of fire department labor : Estimate the city's full cost of fire department labor during the fiscal year assuming no change in staffing. Separate that cost into salary and fringe-benefit components.
Great damage to the user : Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not prope..
During what times is its acceleration negative : draw three separate graphs for acceleration, velocity and displacement. Explain the relationship between the important information on the graphs.
How article might or might not be useful to your research : A one-paragraph summary of the article that integrates a minimum of two quotes that are cited properly within the style of your discipline. A one-paragraph analysis of how the article might or might not be useful to your research.
How much did he spend each day : A hungry college student goes to the cafeteria and buys lunch. The next day he spends twice as much. The third day he spends $1 less than he did the second day. At the end of 3 days he has spent $35. How much did he spend each day? Use MATLAB's s..
The cost of ordering and transportation : You have to supply your customer 100 units of certain product every Monday and only on Monday. You obtain the product from a local supplier at Rs/ 60/- per units. The cost of ordering and transportation from the supplier are Rs. 150/- per order.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  An approved topic in mobile computing and commerce

This choice allows you the freedom to explore newer topics in mobile computing and commerce technologies. Youust have your topic approved by your tutor. Please submit a topic proposal of no less than 200 words to your tutor before you begin work.

  Risks associated with directly executing user input

What are the risks associated with directly executing user input? What are the minimum steps needed to parse user input before it is allowed to be used in execution?What are the risks associated with inheritance in classes? Why are generic classes bo..

  Sources of data and appropriately harvard reference

Present your case study in a report format. Please ensure that you acknowledge ALL your sources of data and appropriately Harvard reference them. Please include the following in your report;

  Determining the annual probability of success

Suppose that an attack would do $100,000 in damage and has a 15% annual probability of success. Spending $9,000 per year on "Measure A" would cut the annual probability of success by 75%. Do a risk analysis comparing benefits and costs. Show your ..

  Find recent news that involves information security

For this assignment, you need to find recent news that involves information security breaches. This news must not be older than one year. Then you need to analyse the chosen news and write a report on it. The report should include but not limited to ..

  Find a regular expression and an finite automata

For the following pair of regular languages, find a regular expression and an Finite Automata that each define L1 ? L2

  Organizational of communication and risk

Introduction: project name, a brief description of the project, and deliverables of the project.

  Explain the discrepancy

Explain the discrepancy

  Describe von neumann architecture

Computer architecture is the combination of software and hardware that is organized in such a fashion as to deliver the machine's intended performance characteristics. Describe Von Neumann architecture and explain why it is important

  Implementation for the r-type instructions add, or, and and

figuring out how to add an implementation for the R-type instructions ADD, OR, and AND. This is a MIPS architecture. // Incomplete behavioral model of MIPS pipeline

  Design a flowchart or pseudocode for a program

Chocolate Delights Candy Company manufactures several types of candy.  Design a flowchart or pseudocode for a program that accepts a candy name (for example, "chocolate-covered blueberries"), price per pound, and number of pounds sold in the average ..

  Three most common alphanumeric codes

This is an individual assignment. You must work alone to complete this quiz. It is important that you complete all readings and videos prior to attempting the quiz. The completed quiz must be submitted in appropriate assignment folder by the due d..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd