Question

The Chief Information Officer (CIO) of the company has asked you to find a way to...

The Chief Information Officer (CIO) of the company has asked you to find a way to use mobile devices, in a secure way, to prevent data leakage.

For this Assignment, based on your readings and through additional research, prepare a 4- to 6-page proposal that describes and evaluates applicable security management solutions for the company. Include the following points:

  • Explain the security threats the employees’ mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.
  • Based on the best practices for mobile security, describe which of these countermeasures you believe would be most effective. Justify your choices.
  • Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to implement the solution.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Here's the report for the above question,

(A) Some security theatres the employees mobile devices may be subjected to. Regarding threats to electronic transactions.

1) Data Leakage. Mobile apps are often the cause of unintentional data leakage.

2) Unsecured Wi-Fi.

3) Network Spoofing.

4) Phishing Attacks.

5) Spyware.

6) Broken Cryptography.

7) Improper Session Handling.

Here are some of the Counter measures which we can apply

  • Default passwords and ideally default usernames to be changed during initial setup
  • Ensuring password recovery mechanisms are robust and do not supply an attacker with information indicating a valid account
  • Ensuring web interface is not susceptible to XSS, SQLi or CSRF
  • Ensuring credentials are not exposed in internal or external network traffic
  • Ensuring weak passwords are not allowed
  • Ensuring account lockout after 3 -5 failed login attempts.
  • Ensuring that the strong passwords are required
  • Ensuring granular access control is in place when necessary
  • Ensuring credentials are properly protected
  • Implement two factor authentication where possible
  • Ensuring that password recovery mechanisms are secure
  • Ensuring re-authentication is required for sensitive features
  • Ensuring options are available for configuring password controls.

Coming to part (B) Here are some of the ways which I believe would be most effective, These are the easy and classic ways which anyone can do easily.

  • PIN or Password enforcement
  • Encryption
  • Containerization of enterprise data
  • OS Compromise detections (Jailbreak and Root detections) and Quarantine
  • Online selective wipe
  • Offline selective wipe
  • Out-of-compliance device triggers the network gateway to block access

Coming to the part (C) I would recommend you to go for the IBM Security Solutions as it meets your business requirements and it also includes tools, processes, and policies required to implement the solution.

Here are some of the features it offers:-

  1. Stopping threats :-
  • Detect and stop advanced threats
  • Automate threat detection and response across the enterprise.
  • Orchestrate incident response
  • Respond proactively, with intelligent orchestration and automation.
  • Master threat hunting
  • Take down even the most persistent threats with the art and science of threat hunting.

2. Grow your business :-

  • Secure hybrid cloud
  • Harness the benefits of hybrid cloud and accelerate digital transformation securely.
  • Protect critical assets
  • Ensure secure flow of data through apps and endpoints.
  • Deliver digital trust
  • Establish digital trust to welcome in the right customers and keep fraudsters out.
Add a comment
Know the answer?
Add Answer to:
The Chief Information Officer (CIO) of the company has asked you to find a way to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Imagine you are the Chief Information Officer in your organization. You have been tasked with identifying...

    Imagine you are the Chief Information Officer in your organization. You have been tasked with identifying the potential threats to your organization. Describe the steps you would take in a disaster recovery plan. What are some of the threats you may need to consider in your location? Include information on the roles and responsibilities be of the different people in the plan. Share your ideas for designing information security practices, including disaster recovery plans for data and service delivery.

  • Learning from lessons of the Stuxnet incident, the Chief Information Officer (CIO) at ACME Energy Company...

    Learning from lessons of the Stuxnet incident, the Chief Information Officer (CIO) at ACME Energy Company is trying to improve its information network security at its energy generation facility. The CIO is trying to evaluate a new intrusion detection technology in the market for a possible replacement for the existing system. An intrusion detection system sounds an “alarm” each time possible malicious attack on a network is detected. The following information is provided: Event of interest, A, is an attack...

  • You are the Chief Information Officer for a local hospital. Recently, your hospital has been required...

    You are the Chief Information Officer for a local hospital. Recently, your hospital has been required to update their policies to protect the information of the patients at the facility. These policies have been scrutinized in the community. Some community members think the new policies are preventing insurance providers to pay claims and for patients to get the information they need. You will write a letter to the editor of your local newspaper to explain why patient privacy, security and...

  • It’s 7 a.m. in San Antonio, Texas, and Rich Marcogliese, chief operating officer of Valero Energy,...

    It’s 7 a.m. in San Antonio, Texas, and Rich Marcogliese, chief operating officer of Valero Energy, is holding his usual morning meeting with the plant managers of 16 major refineries throughout the United States and Canada. On the walls of the headquarters’ operations center are a series of monitors centered by a giant screen with a live display of the company’s Refining Dashboard. Whether the executives are in the room or connected remotely, all eyes are trained on the Web-accessible...

  • I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter T...

    I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...

  • AVIVA Information Technology Strategy Aviva is the fifth-largest insurance group worldwide. It provides savings, investments, and...

    AVIVA Information Technology Strategy Aviva is the fifth-largest insurance group worldwide. It provides savings, investments, and insurance, and has been operating since 1696. The company’s 54,000 employees serve more than 50 million people in 28 countries. In order to integrate the organization at a global level, Aviva needed a platform to be able to communicate with all employees and to allow its employees to be able to share best practices. Aviva wanted to encourage its employees to be innovative and...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • The activity An EHR was implemented at the General Hospital one year ago, before you were...

    The activity An EHR was implemented at the General Hospital one year ago, before you were hired. The implementation process did not go smoothly and now there are strong EHR advocates and strong EHR-dissenters on the team. The CEO wants to move forward with an implementation of the bar-coded medication administration feature of the EHR, but the director of nursing does not. You have been asked to manage the implementation and see that it is successful. You will first need...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT