Mobile devices security

Assignment Help Computer Network Security
Reference no: EM13819842

The use of mobile devices is prevalent and growing rapidly as users heavily depend on them.

Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities.

The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user s credentials and ultimately money. Mobile devices can also spread malware.

Read the article titled, Mobile device attacks surge andFIPS 140-2 Security Policy. In addition, read the report titled, Emerging Cyber Threats 2012.

Write a five to eight (5-8) page paper in which you:

1. Describe the emerging cybersecurity issues and vulnerabilities presented in the Emerging Cyber Threats 2012 report.

2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices.

3. Assess and describe the value of cryptography and encryption in regard to Equifax s approach to implementing stronger security policies around mobile devices.

4. Justify Gunter Ollmann s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this.

5. Several challenges of controlling information online are set forth in the section of the article titled, Controlling Information Online New

Frontier in Information Security. Determine what you believe is the greatest challenge in regard to controlling information online.

6. Justify Dan Kuykendall s statement about the biggest issue with mobile browsers and give two (2) examples illustrating his point.

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student s name, the professor s name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

· Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities.

· Define common and emerging security issues and management responsibilities.

· Explain access control methods and attacks.

· Describe the applications and uses of cryptography and encryption.

· Use technology and information resources to research issues in security management.

· Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.

Reference no: EM13819842

Questions Cloud

Write an essay and five biographies about child development : Write an essay and five biographies about child development.
Construct a process ?ow chart of the existing process : "It was horrible,” said the distraught client. “No matter how many times I provided the information, no one listened to me. And they obviously didn’t listen to each other either, because they used the wrong meds . . . again.”  Construct a process ?ow..
What is the object mass : An object weighs 3300 N. What is the object's mass? An object weighs 3000 lb. What is the object's weight in N? An object weighs 2700 N. What is the object's weight in lb? The mass of a certain elephant is 4,067 kg. (a) Find the elephant's weight in ..
Mobile devices security : Mobile Devices Security
Write essay arguing position on topic related to technology : Write an essay arguing a position on a topic related to technology. In an argumentative essay, you take a strong position on a debatable topic and work to convince your readers of your position.
What it is in respect to 8g at the earth''s surface : Up where the ISS (International Space Station) orbits at 387 km, even though they are weightless there still is an acceleration due to gravity. Calculate its value and what it is in respect to 8g at the Earth's surface.
Describe the twenty-first century competitive landscape : In current market conditions, companies need to gain and then maintain a competitive edge over their competitors. They do this by employing a compelling and dynamic strategic management process to create a strategy that helps them achieve their goals..
Compute the capability index : Compute the capability index (Cp) for the process.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Mobile wireless networks

3G Safekeeping model, safekeeping architecture standards ITU-T X.805 and ISO/IEC 18028-2, access points (AP), network admission controller (NAC) and authentication server (AS)

  Examine how the system balanced security and usability

Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

  Suggest mitigation strategies for vulnerabilities identified

Risk Management varies in each instance and event. Selecting the various options from home or work may help make or break your network.

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

  Security domains of a typical it infrastructure

Analyze the seven security domains of a typical IT infrastructure and determine which two of the seven you would implement first for a nationwide bank. Explain your rationale for your choice.

  Develop a system security plan for an information system

Develop a sample System Security Plan for an information system. Select and incorporate appropriate management, technical, and operational security controls into a system security plan.

  Determine the level of necessary controls to mitigate risks

Describe how an organization determines the level of necessary controls to mitigate the risks while considering the value of its assets.

  Create a report on the threat scope

What are the counter measures to those threats, and how do they fit within the Situational Crime Prevention framework and how does the current law help or hinder your countermeasures? Are there any proposals for laws that would assist?

  Is there a significance to caribbean island of nevis

Does it have the characteristic of being one way or can this number be end result of some other rule if so which rule?

  Describe possible liability issues

Describe regulatory requirements and describe possible liability issues that may be related to these cyberattacks. How should cyber policy controls be adjusted for each organization to reduce vulnerabilities and prevent disruption or theft due to ..

  Identity the various security configuration options

Any potential customer of the State Health Centre must be able to securely access all information aspects pertaining to services offered using a variety of mobile devices.

  You work as a network administrator for a college located

you work as a network administrator for a college located in your local city. next door to the college is a new gated

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd