Recently, a terminated employee used his mobile device to log in to the company
ID: 398447 • Letter: R
Question
Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again.
Explain the goal of information security in relation to mobile devices.
Identify the three sources of threats, provide a summary of each, and provide at least one example of each.
Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.
Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.
Explain human safeguards, and discuss which human safeguard(s) should be implemented.
Discuss why the organization needs an incident response plan to secure information and knowledge.
Explanation / Answer
Ans 1=Mobile security incorporates protecting personal & business info stored on and transmitted from tablets, smartphones & other mobile devices.
Ans 2= The terminology ‘mobile security’ is a wide one which encompasses everything from guarding the mobile devices from malware hazards to lessening risks & safeguarding mobile devices & their data in the event of theft, accidental loss/ unauthorized access of the mobile device.
Ans 3=Mobile security also implies the means thru which devices can authenticate users & restrict the access to info stored on the mobile device thru the utilization of passwords, PINs, pattern screen locking or more advanced types of authentication like eye scanners & other kinds of biometric readers.
Mobile security solutions / apps are available from a broad range of vendors for all the commonly used mobile operating systems, like iOS for iPhones & Microsoft’s Windows Phone.
ans 4=Mobile security is directly linked to MDM (mobile device management), which is a terminology that particularly applies to safeguarding mobile devices in the business environments from theft, & guarding the info on these devices.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.