This is regarding Computer Security:
Mobile devices have been prevalent in everyone’s possession and
replaced many of the home phones and the laptop computers in many
cases. Vendors have sold more smart phones last year than laptop
computers. With this surge of smart phone sales comes with their
security concerns and risks associated in using them. Do some
research on the Mobile Security and synthesize of your finding into
this discussion forum with your findings. You will address the
following:
• The prevalent mobile attacks
• Security on data at rest, in motion, in process.
• Remote access using a VPN capabilities
• Authentication security
• BYOD Policy with MDM
PLEASE MAKE COPY PASTE AVAILABLE
1.The prevalent mobile attacks are
Data leakage mobile apps are often the cause of unintentional data leakage give apps permissions
Unsecured Wifi free Wi-Fi networks are usually unsecured easily hacked by technology experts
Network Spoofing , Phishing Attacks, Spyware Broken, Cryptography, Improper Session Handling , Poor password hygiene.
2. Data is at rest when it is stored on a hard drive protected by firewalls and anti-virus programs Encrypting hard drives is one of the best ways to ensure the security of data at rest
Data in use is more vulnerable than data at rest because more people and devices that have access to the data which can be avoided by authentication at every step in which data required for login in different website.
Data is at its most vulnerable because data can move to different routers or location in forwarding , it can be avoided by encryption platform by Cryptography algorithm such as Rsa algorithm.
3.Remote access vpn allow users to establish secure connections independently with a remote computer anywhere in the world.It is beneficial for organisation with large working employees spread across the globe. The VPN remote access requires a user to authenticate itself by using username or password to sign in to the VPN network established by the organization. If connection is not secured than all private information can be leaked by attacker.
4.Authentication is important because it enables organizations to keep their networks secure by permitting only its users to access its protected resources not others .It work as by authentication of username and password so that private resources can be accessed by specific person.problem that password is not strong or used date of birth which is easily attacker can use the personal information as security question to access the information.
5.Bring your own Device is used in many organisation for cybersecurity concerns many organisation allow employee to bring there own devices with policy set by organisation that use specific anti virus firewall avoid using social media or do not visit not secure website from working devices .Some organisation gives devices by them which has all policy enabled in it which is used by employee they are also allowed to bring mobile phone of there own with MDM policy such as Password policies ,Blocking or removal of specific applications, enabling encryption policies etc.
This is regarding Computer Security: Mobile devices have been prevalent in everyone’s possession and replaced many...