Preview

Business Risks And Security Assessment

Powerful Essays
Open Document
Open Document
2564 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Business Risks And Security Assessment
Proceedings of the 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics, Vancouver, Canada, June 19-21, 2007

189

Business Risks and Security Assessment for Mobile Devices
PATRICIA MAYER MILLIGAN
Information Systems Department
Baylor University
Waco, Texas
USA
pati_milligan http://business.baylor.edu/pati_milligan/
DONNA HUTCHESON
Director of It Audit
TXU Corporation
Dallas, Texas
USA
dhutche1 http://www.txu.com
Abstract: - Technology advances over the past decade have elevated business risk from mobile devices to an unparalleled high. The relationships between security, business risks, and their corresponding costs are increasingly complex. Corporate security measures have lagged behind the need for protection. Bottom line security relies on the individual business professional is ethics and diligence in protecting confidential corporate, market, and customer information. This paper identifies and compares the various business risks, assesses prevalent security solutions, and analyzes the total cost of corporate mobile technology.
Key-Words: - Security, Wireless, Smart phone threat, PDA threat, Network threat, Business risk, Malware

1 Introduction
Computing technology advances in the past decade have created a much more flexible corporate work environment. This flexibility is reflected in small mobile devices that are easy to use, provide the ability to receive and make phone calls and voice messages, send and receive emails and instant messages, access the intranet, surf the internet, and access business applications. These capabilities are available whether you are out of the office or out of the country.
Wireless devices make geographic distance a nonissue. Flexibility is also reflected in extremely small mass storage devices. Up to 4 GB of data (equating to approximately 80,000 boxes of paper) can be as small as a pen.
Mobile
technology has enabled greater productivity, availability, and convenience to business professionals and

You May Also Find These Documents Helpful

  • Good Essays

    o Formulate security measures for protection of the intellectual property aspect of e-business that should be in place for organizations in this industry.…

    • 492 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    I think as businesses start to see the extent of how many of these new communication resources can benefit them, they will overcome their fear of employees misusing them. Hands free phone usage and instant messaging could play a…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Criminogenic needs can be described as changeable risk factors, that when reduced, result in reduced criminal behaviour. These needs are termed “criminogenic” because they are empirically related to criminal conduct and when reduced, lead to reductions in future reoffending. Therefore, changes in criminogenic needs have a desired effect on changes in criminal behaviour. In the Risk Assessment case study, a number of these criminogenic needs as well as the “central eight” risk factors are evident contributors to the criminal nature and history of the accused. The first and most important criminogenic need in respect to the case is the Family/Marital factor. The accused believed that his wife had been having an affair and he constantly accused her of infidelity and being seductive with other men. These feelings of insecurity led to many years of constant arguments and assault cases with his wife up until he killed her. This is evident in the fact that the first assault case filed against him was when he was aged 37 and the cases lingered up until the accused was 42. This criminogenic need also directly relates with the family and/or marital “central eight” risk factor. The second most important criminogenic need in respect to the case is the Substance Abuse factor. The substance being abused in this case is alcohol. The accused is of the opinion that his antisocial and violent behaviour is motivated by alcohol abuse. Alcohol substance abuse can also be traced in the impaired driving charges accrued by the accused, which served as one of his previous convictions. Alcohol abuse can also be held responsible for his current state of unemployment as it got him fired from previous jobs. Ultimately, it could be the reason why he does not remember the incidents leading to the murder of his wife because he could have been under the influence.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Bis 220 Week 3 Questions

    • 648 Words
    • 3 Pages

    In what ways have smart phones that incorporate wireless technologies changed the business landscape? Smart phones that incorporate wireless technologies have changed the business landscape in many ways. With smart phones we now have the ability to check and respond to important emails or calls when not in the office or workplace. Most businesses now require their corporate workers, managers, and supervisors to carry smart phones or mobile devices at all times. Businesses are now relying on mobile technology to communicate with employees and consumers. Many banks as well as credit card companies have simplified using their cards/branches by offering mobile applications, which also provides a means of advertising for these companies as well. Many universities are now offering free apps for students to use. The apps allow the students to access their classes, library, course information, student accounts, as well as submit…

    • 648 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Security Self Assessment

    • 1535 Words
    • 7 Pages

    This report is a derivative of security self-assessment based on the National Institute of Standards and Technology (NIST) special publication 800-26 (SP 800-26) (Swanson). The organization being assessed is an electronics and computer manufacturer’s technical support division technical and physical controls to support the information technology security. We will refer to this organization as Tech Inc., which is a fictitious name for this company.…

    • 1535 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The first step in securing your network is to identify the vulnerability and the risk associate with it. Risk Treatment Plan is based on overall security framework and based on the risk and vulnerability assessment. Risk Treatment is a process of selection and implementation of measures to mitigate risks identified earlier. We shall help your COMPANY in deciding the approach that it would take to manage the vulnerability and determine the degree of risk that it is prepared to accept. We shall assist technical team in formulating an effective vulnerability mitigation and resolution to address the vulnerabilities associated with the assets of the organization. This would be done by recommending industry best practice controls and establishing procedures for your company to mitigate these risks. The vulnerability assessment activity will address the security of different layers of technology according to the following diagram. There are several technology elements which will address more than one layer.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Pan Boricua

    • 1197 Words
    • 5 Pages

    HUGE RISK, are people ready to fix mortgages and credit cards on mobile devices? Trust, human touch (behavior thru habit)…

    • 1197 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Apple vs. Google

    • 2092 Words
    • 9 Pages

    In 2010, the hardware devices and software applications were going through a major expansion. With ubiquitous internet access, mobile devices with advanced functionality were rapidly gaining on traditional desktop computing as the most popular form of computing, changing the basis for competition throughout the industry. Research firm predicted that mobile phones will surpass PCs as the way most people access the Internet. The mobile devices are made available to anyone with instant internet connectivity. Who needs a desktop or laptop PC when you can check email, listen to music, and watch video 27/4? The mobile devices are good enough…

    • 2092 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Smartphone Security

    • 2339 Words
    • 10 Pages

    Are you buzzing about the new Verizon Blackberry Storm or the T Mobile G1? They are the new crave and everyone wants one right? What these owners many not know are the security risks that surround the raving technology. Most of the unawareness starts at companies and customers not placing more significance on security as smartphones get smarter. Although a smartphone may not be at greater risk than a PC, some security issues and risks are still present with PDA’s and smartphones.…

    • 2339 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Despite the fact that most applications undergo security assessments they remain insecure and have quickly become a popular avenue of attack for cybercriminals looking to profit from your organization’s sensitive data.…

    • 773 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    *Department of Economics, Johns Hopkins University, Baltimore, MD 21218; †Department of Mathematics, National University of Singapore, Singapore 119260;…

    • 4753 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    2.Bao, P., Pierce, J., Whittaker, S., and Zhai, S. Smart phone use by non-mobile business users. In ACM MobileHCI (2011).…

    • 3076 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Being an entrepreneur and operating a business involves accepting risk. Business Owners are exposed to two primary kinds of risks: Financial risk and Business risk (Oscar Guzman).…

    • 1760 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Mathematics have been one of the primary elements of business and economics since ancient times, when farmers had to count the animals in their possession and merchants had to have a clear picture of their goods' value. With the introduction of money as the universal legal tender, all goods acquired a numerical value, making math calculations even more important. Furthermore, in the competitive global market environment of today, businesses have to take advantage of every opportunity for profit, making frequent statistical market analyses a necessity.…

    • 1414 Words
    • 6 Pages
    Powerful Essays