Question

This is regarding Computer Security: Mobile devices have been prevalent in everyone’s possession and replaced many...

This is regarding Computer Security:

Mobile devices have been prevalent in everyone’s possession and replaced many of the home phones and the laptop computers in many cases. Vendors have sold more smart phones last year than laptop computers. With this surge of smart phone sales comes with their security concerns and risks associated in using them. Do some research on the Mobile Security and synthesize of your finding into this discussion forum with your findings. You will address the following:

• The prevalent mobile attacks
• Security on data at rest, in motion, in process.
• Remote access using a VPN capabilities
• Authentication security
• BYOD Policy with MDM

PLEASE MAKE COPY PASTE AVAILABLE

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1.The prevalent mobile attacks are

Data leakage mobile apps are often the cause of unintentional data leakage give apps permissions

Unsecured Wifi free Wi-Fi networks are usually unsecured easily hacked by technology experts

Network Spoofing , Phishing Attacks, Spyware Broken, Cryptography, Improper Session Handling , Poor password hygiene.

2. Data is at rest when it is stored on a hard drive  protected by firewalls and anti-virus programs Encrypting hard drives is one of the best ways to ensure the security of data at rest

Data in use is more vulnerable than data at rest because more people and devices that have access to the data which can be avoided by authentication at every step in which data required for login in different website.

Data is at its most vulnerable because data can move to different routers or location in forwarding , it can be avoided by encryption platform by Cryptography algorithm such as Rsa algorithm.

3.Remote access vpn allow users to establish secure connections independently with a remote computer anywhere in the world.It is beneficial for organisation  with large working  employees spread across the globe. The VPN remote access requires a user to authenticate itself by using username or password to sign in to the VPN network established by the organization. If connection is not secured than all private information can be leaked by attacker.

4.Authentication is important because it enables organizations to keep their networks secure by permitting only its users to access its protected resources not others .It work as by authentication of username and password so that private resources can be accessed by specific person.problem that password is not strong or used date of birth which is easily attacker can use the personal information as security question to access the information.

5.Bring your own Device is used in many organisation for cybersecurity concerns many organisation allow employee to bring there own devices with policy set by organisation that use specific anti virus firewall avoid using social media or do not visit not secure website from working devices .Some organisation gives devices by them which has all policy enabled in it which is used by employee they are also allowed to bring mobile phone of there own with MDM policy such as Password policies ,Blocking or removal of specific applications, enabling encryption policies etc.

Add a comment
Know the answer?
Add Answer to:
This is regarding Computer Security: Mobile devices have been prevalent in everyone’s possession and replaced many...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT