Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

How secure is your smartphone case study answers

23/10/2021 Client: muhammad11 Deadline: 2 Day

Case study 4 chapter 8

1.

2. Answer the Case Study Questions (found at the end of each case study) in 500-750 words total (not including reference list).

3. Include at least one additional, external reference to sources such as an article or video. Cite the reference(s) in your study.

Your case study will be graded on the following:

Grading: 20 points

Content 80% (how thoroughly and logically you answer the questions, how well you incorporate your reference(s), how well you make arguments and state facts to support your answers).

Spelling/Grammar/Punctuation 20%

Interactive Session: Technology BYOD: A Security Nightmare?
Bring your own device has become a huge trend, with half of employees with mobile computing tools at workplaces worldwide using their own devices. This figure is expected to increase even more in the years to come. But while use of the iPhone, iPad, and other mobile computing devices in the workplace is growing, so are security problems. Quite a few security experts believe that smartphones and other mobile devices now pose one of the most serious security threats for organizations today.

Whether mobile devices are company-assigned or employee-owned, they are opening up new avenues for accessing corporate data that need to be closely monitored and protected. Sensitive data on mobile devices travel, both physically and electronically, from the office to home and possibly other off-site locations. According to a February 2016 Ponemon Institute study of 588 U.S. IT and security professionals, 67 percent of those surveyed reported that it was certain or likely that an employee’s mobile access to confidential corporate data had resulted in a data breach. Unfortunately, only 41 percent of respondents said their companies had policies for accessing corporate data from mobile devices.

More than half of security breaches occur when devices are lost or stolen. That puts all of the personal and corporate data stored on the device, as well as access to corporate data on remote servers, at risk. Physical access to mobile devices may be a greater threat than hacking into a network because less effort is required to gain entry. Experienced attackers can easily circumvent passwords or locks on mobile devices or access encrypted data. Moreover, many smartphone users leave their phones totally unprotected to begin with or fail to keep the security features of their devices up-to-date. In the Websense and the Ponemon Institute’s Global Study on Mobility Risks, 59 percent of respondents reported that employees circumvented or disabled security features such as passwords and key locks.

Another worry today is large-scale data leakage caused by use of cloud computing services. Employees are increasingly using public cloud services such as Google Drive or Dropbox for file sharing and collaboration. Valiant Entertainment, Cenoric Projects, Vita Coco, and BCBGMAXAZRIAGROUP are among the companies allowing employees and freelance contractors to use Dropbox for Business to post and share files. There are also many instances where employees are using Dropbox to store and exchange files without their employers’ approval. In early 2015 Dropbox had to patch a security flaw that allowed cyberattackers to steal new information uploaded to accounts through compromised third-party apps that work with Dropbox services on Android devices. There’s very little a company can do to prevent employees who are allowed to use their smartphones from downloading corporate data so they can work on those data remotely.

Text messaging and other mobile messaging technologies are being used to deliver all kinds of scam campaigns, such as adult content and rogue pharmacy, phishing, and banking scams, and text messages have been a propagation medium for Trojan horses and worms. A malicious source is now able to send a text message that will open in a mobile browser by default, which can be readily utilized to exploit the recipient.

To date, deliberate hacker attacks on mobile devices have been limited in scope and impact, but this situation is worsening. Android is now the world’s most popular operating system for mobile devices with 81 percent of the global market, and most mobile malware is targeted at the Android platform. When corporate and personal data are stored on the same device, mobile malware unknowingly installed by the user could find its way onto the corporate network.

Apple uses a closed “walled garden” model for managing its apps and reviews each one before releasing it on its App Store. Android application security has been weaker than that for Apple devices, but it is improving. Android application security uses sandboxing, which confines apps, minimizing their ability to affect one another or manipulate device features without user permission. Google removes any apps that break its rules against malicious activity from Google Play, its digital distribution platform that serves as the official app store for the Android operating system. Google also vets the backgrounds of developers. Recent Android security enhancements include assigning varying levels of trust to each app, dictating what kind of data an app can access inside its confined domain, and providing a more robust way to store cryptographic credentials used to access sensitive information and resources.

Google Play now provides security scanning of all applications before they are available to download, ongoing security checks for as long as the application is available, and a Verify Apps service for mobile device protection for apps installed outside of Google Play. However, these Android improvements are largely only for people who use a phone or tablet running a newer version of Android and restrict their app downloads to Google’s own Play store.

Companies need to develop mobile security strategies that strike the right balance between improving worker productivity and effective information security. Aetna’s Chief Security Officer (CSO) Jim Routh says there is a certain minimum level of mobile security he requires regardless of whether a device is company- or personally owned. Aetna has about 6,000 users equipped with mobile devices that are either personally owned or issued by the company. Each device has mandatory protection that provides an encrypted channel to use in unsecured Wi-Fi networks and alerts the user and the company if a malicious app is about to be installed on the device.

Colin Minihan, director of security and best practices at VMWare AirWatch, believes that understanding users and their needs helps a mobile security strategy progress further. VmAirWatch categorizes similar groups of users and devises a specific plan of action for each group, choosing the right tools for the job.

According to Patrick Hevesi, Nordstrom’s former director of security, if users need access to critical corporate data that must be protected, the firm should probably allow only fully managed, fully controlled, approved types of devices. Users who only want mobile tools for e-mail and contacts can more easily bring their own devices. The key questions to ask are called the “three Ws”: Who needs access? What do they need to access? What is the security posture of the device?

Sources: Michael Heller, “Mobile Security Strategy Matures with BYOD,” and Kathleen Richards, “CISOs Battle to Control Mobile Risk in the Workplace,” Information Security Magazine, June 1, 2016; Nathan Olivarez-Giles, “Android’s Security Improves—for the Few,” Wall Street Journal, April 21, 2016; Ponemon Institute, “The Economic Risk of Confidential Data on Mobile Devices in the Workplace,” February, 2016; McAfee Inc., “Mobile Threat Report: What’s on the Horizon for 2016,” 2016; Charlie Osborne, “Dropbox Patches Android Security Flaw,” Zero Day, March 11, 2015; Edel Creely, “5 BYOD Security Implications and How to Overcome Them,” Trilogy Technologies, May 26, 2015; Tony Kontzer, “Most of Your Mobile Apps Have Been Hacked,” Baseline, January 16, 2015; and Ponemon Institute, Global Study on Mobility Risks (February 2012).

Case Study Questions
1. It has been said that a smartphone is a computer in your hand. Discuss the security implications of this statement.

2. What kinds of security problems do mobile computing devices pose?

3. What management, organizational, and technology issues must be addressed by smartphone security?

4. What steps can individuals and businesses take to make their smartphones more secure?

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Accounting & Finance Specialist
Smart Homework Helper
Top Grade Essay
Solutions Store
Instant Assignments
Fatimah Syeda
Writer Writer Name Offer Chat
Accounting & Finance Specialist

ONLINE

Accounting & Finance Specialist

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$27 Chat With Writer
Smart Homework Helper

ONLINE

Smart Homework Helper

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$15 Chat With Writer
Top Grade Essay

ONLINE

Top Grade Essay

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$49 Chat With Writer
Solutions Store

ONLINE

Solutions Store

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$30 Chat With Writer
Instant Assignments

ONLINE

Instant Assignments

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$42 Chat With Writer
Fatimah Syeda

ONLINE

Fatimah Syeda

I am a professional and experienced writer and I have written research reports, proposals, essays, thesis and dissertations on a variety of topics.

$38 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Case study resonus corporation - The breather billy collins - Maximilien robespierre youtube channel - The death of mr kal q luss - Collaborative assessment and management of suicidality - Fennell v robson excavations - 2 coments each one 150 words (CITATION AND REFERENCE) - PROBLEM SOLVING DISCUSSION - Selecciona la respuesta que mejor completa cada oración. - Isbn 978 1 118 34500 9 - Qml seminal fluid collection - Celta course birmingham brasshouse - 2 8 9 3 7 as a mixed number - Week 4 Assignment - Introduction of distributed database system - What can i use instead of pirates bay - Colorectal surgeon rvi newcastle - Nonessential adjective clause examples - Clique pens the writing implements division of us homes - Catherine mcauley high school - Pestilent park rage 2 storage containers - Ezra pound in a station of the metro pdf - Photoelectron spectroscopy ap chemistry worksheet - Community Health Case 1 - Leadership ch 7 - Travis perkins warrington postcode - Invitation letter for speaker in a seminar - Common root words and word origins - Boom and bitner 1981 - Clozapine dosage and titration chart - Ds al fine definition - ORG/535 Week 4 Apply: Recruitment - Chapter 13 the expenditure cycle purchasing to cash disbursements - Molecular models of neutral molecules - Week - Eileen o brien umbc - 3 acts of the mind - What is the burgess model - My micros pizza hut - Anne geddes country bumpkin plate - 2357 unit 604 answers - Type hierarchy in dbms - Cloud computing and business organizations - Inductance of a toroid with a square cross section - To kill a mockingbird reading quiz - Gastric sleeve pre op diet cheating - Dylan fatone death farmingdale ny - Adime assessment examples - Reiv sale of business contract - Cpu scheduling algorithms questions and answers - Several Wrong Answers - Nursing progress notes cheat sheet - Samsung nand flash part number decoder - El burlador de sevilla english translation - The three principles of economics include optimization, equilibrium, and empiricism. - Modeling tools in java - Week. 5 project - Pangea jigsaw puzzle worksheet - Who owns the zebra and who drinks water - Discussion - Solve this if you are a genius 5 3 28 - Heart rate response nasm - Domestic building contracts regulations - Suppose your lab partner recorded a measurement as 100g - Emerging contemporary readings for writers 4th edition free pdf - Graham woodhouse conveyancing burnie tas - How to calculate total impedance - Microsoft onedrive vs google drive - Snow white poem by anne sexton - Swot analysis of coca cola 2018 - Does either configuration violate the pauli exclusion principle - How to answer sociology essay questions - BCOMM5.01 - Summarize the key challenges faced in training expatriate managers - Dulux electro dark bronze - Vol au vent cases asda - Electrical separation shaver socket diagram - Types of heat transfer worksheet - Econometrics and mathematical economics pdf - Manrose indoor tumble dryer kit instructions - VIDEO - Sex without love poem summary - Clinical psychology history and evolving nature - Internal Medicine 14: 18-year-old female for pre-college - Mobile application wbs - Will a p1 licence be suspended for any speeding offence - Distribued Computing - R 2f in convex mirror - What was the kitchen called in the bryson house quizlet - Cisco academy support center - Computer history assignments - Broward wind load chart - Discussion question - What new ideas did the stoics introduce - Buell 1125cr service manual - Small assignment - Media ethics issues and cases 9th edition - Changes in Fixed and Variable Costs; Break-Even and Target Profit Analysis - What is the net electric potential at point p - Amazon's international strategy