Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

Can someone help me with answering these questions with a managerial perspective:Case

Can someone help me with answering these questions with a managerial perspective:Case Study

Questions

  1. It has been said that a smartphone is a computer in your hand. Discuss the security implications of this statement.
  2. What management, organizational, and technology issues must be addressed by smartphone security?
  3. What problems do smartphone security weaknesses cause for businesses?
  4. What steps can individuals and businesses take to make their smartphones more secure? ATTACHMENT PREVIEW Download attachmentInteractive Session: Technology BYOD: It’s Not So SafeBring Your Own Device has become a huge trend, with nearly one-third of employees usingpersonal devices at workplaces worldwide. This figure is expected to increase even more in theyears to come. But while use of the iPhone, iPad and other mobile computing devices in theworkplace is growing, so are security problems.Whether these devices are company-assigned or employee-owned, they are opening up newavenues for accessing corporate data that need to be closely monitored and protected. Sensitivedata on mobile devices travels, both physically and electronically, from the office to home andpossibly other off-site locations. According to a 2012 survey of 400 technology professionals byresearchers at Decisive Analytics, nearly half of companies that allow personally-owned devicesto connect to the corporate network have experienced a data breach, either because of employees’unwitting mistakes or intentional wrongdoing. Quite a few security experts believe thatsmartphones and other mobile devices now pose one of the most serious security threats fororganizations today.One of the biggest security dangers of smartphones is that the devices could become lost. Thatputs all of the personal and corporate data stored on the device, as well as access to corporatedata on remote servers, at risk. According to a Ponemon Institute study of 116 organizations, 62percent of mobile devices housing data that were lost or stolen contained sensitive or confidentialinformation. Information Week’s 2014 State of Mobile Security report stated that 72 percent ofresponding companies said their top mobile security concern was lost or stolen devices.Physical access to mobile devices may be a greater threat than hacking into a network becauseless effort is required to gain entry. Experienced attackers can easily circumvent passwords orlocks on mobile devices or access encrypted data. This may include not only corporate datafound on the device but also passwords residing in insecure places such as iPhone Keychain,which could grant access to corporate services such as email or the virtual private network.Moreover, many smartphone users leave their phones totally unprotected to begin with. In theWebsense and the Ponemon Institute’s Global Study on Mobility Risks, 59 percent ofrespondents reported that employees circumvented or disabled security features such aspasswords and key locks. Intruders can also gain physical access to mobile devices by pluggingView the Answerinto a device using a USB connection or SD card slot. Even leaving a device alone for a minuteon a desk or chair can lead to serious theft of data in a few minutes.Another worry today is large scale data leakage caused by use of cloud computing services.Employees are increasingly using public cloud services such as Google Drive or Dropbox forfile-sharing and collaboration. For example, Mashery, a 170-employee company that helps othercompanies build apps, allows employees with iPhones to use Dropbox, Box, Teambox, andGoogle Drive to store memos, spreadsheets, and customer information . These services arevulnerable. In July 2012, Dropbox reported a loss of login names and passwords from a largenumber of customers, and in 2011, Chinese hackers obtained access to hundreds of U.S.government accounts on Google Gmail. There’s very little a company can do to preventemployees who are allowed to use their smartphones from downloading corporate data so theycan work on that data remotely.Although deliberate hacker attacks on mobile devices have been limited in scope and impact, thissituation is worsening, especially among Android devices vulnerable to rogue apps. According toMcAfee, a leading computer security software firm, malware in Android mobile operatingsystems alone grew by 33 percent in 2013. Android is now the world’s most popular operatingsystem for mobile devices.Security on the Android platform is much less under Google’s control than Apple devicesrunning iOS because Google has an open app model. Google does not review any Android apps(as Apple does for its apps), but instead relies on technical hurdles to limit the impact ofmalicious code, as well as user and security expert feedback. Google apps run in a “sandbox,”where they cannot affect one another or manipulate device features without user permission.Google removes from its official Android Market any apps that break its rules against maliciousactivity. Google also vets the backgrounds of developers, and requires developers to register withits Checkout payment service both to encourage users to pay for apps using their service and toforce developers to reveal their identities and financial information. Recent Android securityenhancements include assigning varying levels of trust to each app, dictating what kind of dataan app can access inside its confined domain, and providing a more robust way to storecryptographic credentials used to access sensitive information and resources. Still, from acorporate standpoint, it is almost impossible to prevent employees from downloading apps thatmight track critical information when people use their own devices in the workplace.Show 
 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"