Preview

Risk of Mobile Technologies

Good Essays
Open Document
Open Document
610 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk of Mobile Technologies
Thoroughly identified the risks inherent in the use of wireless and mobile technologies.
Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.
Thoroughly analyzed the identified risks and thoroughly developed factors to mitigate the risks.
Understanding the risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. Maintaining secure wireless network is an ongoing process that requires greater effort that the required for other networks and systems. By assessing the risks, testing and evaluating system security controls for wireless networks more frequent can help prevent problems. There are many ways to improve the management of wireless or mobile technology like the following: * Creating backups of data frequently * Preforming



References: Milligan, P., & Hutcheson, D. (2008). Business risks and security assessment for mobile devices, Audit and Control Association. www.isaca.org https://docs.google.com/viewer?a=v&q=cache:rCt1m3UM18AJ:www.isaca.org/Journal/Past-Issues/2008/Volume-1/Documents/jpdf0801-business-risks.pdf+risk+inherent+in+using+mobile+and+wireless+technology&hl=en&gl=us&pid=bl&srcid=ADGEESgchcyiW7LOd-akV09EkMxXxd1VCumIKTw58NI7lN-xbA3vJ_Em37ErJgIG2BrGjlsxy6j1wT7j3U4ARwDDOGdiGVeGNN05pJ3Ljfp UeR4pzS5T49FrOr-xnPMFf-Kzzreojwin&sig=AHIEtbSeyo3aKqdZD3uk79VZzWkrHelkNQ Urbas, G., & Krone, T. (2006). Retrieved from Australian Government website: https://docs.google.com/viewer?a=v&q=cache:XuG2OtzcfBMJ:www.aic.gov.au/documents/E/9/9/%257BE99293FF-9E0F-4522-8E54-0598720C45B2%257Dtandi329.pdf+risk+of+wireless+and+mobile+technology&hl=en&gl=us&pid=bl&srcid=ADGEEShcsgs_t1p3InoPrVRj8zP9bLecXSi-GeXslZ2em5A76abYH3wtw3EyAynwG1QIqn-sTfizBnWbowmgKMnEW1nNIAyWWmbKv5ls8hI8s3juB4JhFQqZCsJkXdRKJPl GcjE0vBEP&sig=AHIEtbQZ9NmKUg9ECEV4V-xsKXD9QqgQwg Kim , D., & Solomon, M. (2012). Funsamentals of information system security. Ontario: Jones &Bartlett learning Canada.

You May Also Find These Documents Helpful

  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Task 3

    • 4254 Words
    • 17 Pages

    Complete a thorough analysis of the mobile device policies. Periodically examine mobile device usage and identify security risks/threat.…

    • 4254 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    The use of wireless technology in business and everday life is prevelant in today’s society as a whole. I have a wireless phone use, use Bluetooth and wireless internet on my laptop, as well as being able to transmit ans share internet, in my home and…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Kim, D. , & Solomon, M. (2012). Fundamentals of Information Systems Security. Sudbury, MA: Jones & Bartlett Learning.…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Test

    • 414 Words
    • 2 Pages

    www.informationweek.com/.../security/nist...security.../24000...Jul 30, 2012 – Guidelines focus on wireless security and protecting mobile devices ... how federal agencies and businesses can deal with network attacks and malware. ... revised to reflect the latest in security best practices: NIST 's Guide to ...…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Effective data encryption comes standard on your home network wireless router and information transmitted cannot be read without the correct encryption key. Password protection can be enabled on all devices and users should choose strong passwords of adequate length. Thefts of wireless devices are on the rise. Users can learn ways protect themselves and the device from crime, and make a loss or theft known the employer or carrier for fast action.…

    • 864 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Dangers of Cell Phones

    • 1006 Words
    • 5 Pages

    I am sure that most of you own cell phones and that you can’t leave your home without it. And that all of you think of cell phones as one of the most useful devices of our time. Despite all that, have you ever considered dangers of using cell phones or thought about the harmful effects of the microwave radiations? (Pause) Just 10 years ago, cordless telephones were something used only by big businesses and privileged persons, but Nowadays; it seems that every kid in middle school carries a cell phone in their backpack. We are starting to get used to people seemingly talking to themselves everywhere. The benefits of cell phones are undoubtedly numerous; especially in emergency situations. However; technology that improves convenience, often has a destructive side, and Cell phones are no exception.…

    • 1006 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    According to the article “Bring Your Own Risk in BYOD,” the author points out the MDM solutions as well as lessons learned on BYOD implementation. The lessons learned in this article emphasized the security that should be put in place or the measures that organizations need to take in order to operate in a safe and positive environment with BYOD. The Mobile Device Management (MDM) solution, which is part of the Enterprise Mobility Management (EMM), employs solutions to manage risks which allow employees to use their mobile devices to access organizations’ services and data.…

    • 934 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Wifi- Health Effects

    • 1297 Words
    • 6 Pages

    What other devices emit microwave radiation? There are many other devices that emit the same radiation as Wi-Fi. These include:…

    • 1297 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Mobile Computing Issues

    • 2189 Words
    • 18 Pages

    Introduction • There are several characteristics of wireless networks and mobile devices that give rise to issues that do not pose a problem in fixed, wired infrastructure. – Adaptive behaviour p – Battery power – Limitation on local resources – Small display size – Disparity in the availability of remote services – Unpredictable variation in QoS. Issues in Mobile Computing WRES3405 (3) 1 Adaptive Behaviour Effective use of smart space space. Invisibility. Localised scalability.…

    • 2189 Words
    • 18 Pages
    Good Essays