Preview

Business Risks And Security Assessment

Powerful Essays
Open Document
Open Document
2564 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Business Risks And Security Assessment
Proceedings of the 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics, Vancouver, Canada, June 19-21, 2007

189

Business Risks and Security Assessment for Mobile Devices
PATRICIA MAYER MILLIGAN
Information Systems Department
Baylor University
Waco, Texas
USA
pati_milligan http://business.baylor.edu/pati_milligan/
DONNA HUTCHESON
Director of It Audit
TXU Corporation
Dallas, Texas
USA
dhutche1 http://www.txu.com
Abstract: - Technology advances over the past decade have elevated business risk from mobile devices to an unparalleled high. The relationships between security, business risks, and their corresponding costs are increasingly complex. Corporate security measures have lagged behind the need for protection. Bottom line security relies on the individual business professional is ethics and diligence in protecting confidential corporate, market, and customer information. This paper identifies and compares the various business risks, assesses prevalent security solutions, and analyzes the total cost of corporate mobile technology.
Key-Words: - Security, Wireless, Smart phone threat, PDA threat, Network threat, Business risk, Malware

1 Introduction
Computing technology advances in the past decade have created a much more flexible corporate work environment. This flexibility is reflected in small mobile devices that are easy to use, provide the ability to receive and make phone calls and voice messages, send and receive emails and instant messages, access the intranet, surf the internet, and access business applications. These capabilities are available whether you are out of the office or out of the country.
Wireless devices make geographic distance a nonissue. Flexibility is also reflected in extremely small mass storage devices. Up to 4 GB of data (equating to approximately 80,000 boxes of paper) can be as small as a pen.
Mobile
technology has enabled greater productivity, availability, and convenience to business professionals and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    I think as businesses start to see the extent of how many of these new communication resources can benefit them, they will overcome their fear of employees misusing them. Hands free phone usage and instant messaging could play a…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Bis 220 Week 3 Questions

    • 648 Words
    • 3 Pages

    In what ways have smart phones that incorporate wireless technologies changed the business landscape? Smart phones that incorporate wireless technologies have changed the business landscape in many ways. With smart phones we now have the ability to check and respond to important emails or calls when not in the office or workplace. Most businesses now require their corporate workers, managers, and supervisors to carry smart phones or mobile devices at all times. Businesses are now relying on mobile technology to communicate with employees and consumers. Many banks as well as credit card companies have simplified using their cards/branches by offering mobile applications, which also provides a means of advertising for these companies as well. Many universities are now offering free apps for students to use. The apps allow the students to access their classes, library, course information, student accounts, as well as submit…

    • 648 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Security Self Assessment

    • 1535 Words
    • 7 Pages

    This report is a derivative of security self-assessment based on the National Institute of Standards and Technology (NIST) special publication 800-26 (SP 800-26) (Swanson). The organization being assessed is an electronics and computer manufacturer’s technical support division technical and physical controls to support the information technology security. We will refer to this organization as Tech Inc., which is a fictitious name for this company.…

    • 1535 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The first step in securing your network is to identify the vulnerability and the risk associate with it. Risk Treatment Plan is based on overall security framework and based on the risk and vulnerability assessment. Risk Treatment is a process of selection and implementation of measures to mitigate risks identified earlier. We shall help your COMPANY in deciding the approach that it would take to manage the vulnerability and determine the degree of risk that it is prepared to accept. We shall assist technical team in formulating an effective vulnerability mitigation and resolution to address the vulnerabilities associated with the assets of the organization. This would be done by recommending industry best practice controls and establishing procedures for your company to mitigate these risks. The vulnerability assessment activity will address the security of different layers of technology according to the following diagram. There are several technology elements which will address more than one layer.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Smartphone Security

    • 2339 Words
    • 10 Pages

    Are you buzzing about the new Verizon Blackberry Storm or the T Mobile G1? They are the new crave and everyone wants one right? What these owners many not know are the security risks that surround the raving technology. Most of the unawareness starts at companies and customers not placing more significance on security as smartphones get smarter. Although a smartphone may not be at greater risk than a PC, some security issues and risks are still present with PDA’s and smartphones.…

    • 2339 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    There are many hazards associated in an industrial workplace. With new technologies, new machinery and constant updates with regulations it is more important now than ever before to produce efficient risk assessments. Good risk assessments reduce hazards and fatalities in dangerous areas in the workplace. A good risk assessment will make workers feel safer and therefore happier and promotes a good business structure within the company. A good risk assessment will help prevent legal action against the company therefore saving the company money.…

    • 2973 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Pan Boricua

    • 1197 Words
    • 5 Pages

    HUGE RISK, are people ready to fix mortgages and credit cards on mobile devices? Trust, human touch (behavior thru habit)…

    • 1197 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Apple vs. Google

    • 2092 Words
    • 9 Pages

    In 2010, the hardware devices and software applications were going through a major expansion. With ubiquitous internet access, mobile devices with advanced functionality were rapidly gaining on traditional desktop computing as the most popular form of computing, changing the basis for competition throughout the industry. Research firm predicted that mobile phones will surpass PCs as the way most people access the Internet. The mobile devices are made available to anyone with instant internet connectivity. Who needs a desktop or laptop PC when you can check email, listen to music, and watch video 27/4? The mobile devices are good enough…

    • 2092 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    With the development of technology, we may confront the fact that mobility in business environment is becoming a more and more crucial element to determine the position of a corporation and its long-term profitability. Enhancing the use of mobile devices to improve the organization’s productivity comes to be the top priority of a business entity’s agenda, at the same time, security and risk concerns cannot be ignored.…

    • 5231 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    *Department of Economics, Johns Hopkins University, Baltimore, MD 21218; †Department of Mathematics, National University of Singapore, Singapore 119260;…

    • 4753 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    2.Bao, P., Pierce, J., Whittaker, S., and Zhai, S. Smart phone use by non-mobile business users. In ACM MobileHCI (2011).…

    • 3076 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Mcomerce

    • 14247 Words
    • 57 Pages

    Department of Computer Science and Information Systems, University of Jyvaskyla, Finland b Department of Mathematical Information Technology, University of Jyvaskyla, Finland Helsinki Institute for Information Technology and Department of Computer Science, University of Helsinki, Finland Received 16 June 2005; received in revised form 27 September 2005; accepted 1 October 2005 Available online 20 March 2006…

    • 14247 Words
    • 57 Pages
    Powerful Essays
  • Powerful Essays

    Being an entrepreneur and operating a business involves accepting risk. Business Owners are exposed to two primary kinds of risks: Financial risk and Business risk (Oscar Guzman).…

    • 1760 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Despite the fact that most applications undergo security assessments they remain insecure and have quickly become a popular avenue of attack for cybercriminals looking to profit from your organization’s sensitive data.…

    • 773 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Mathematics have been one of the primary elements of business and economics since ancient times, when farmers had to count the animals in their possession and merchants had to have a clear picture of their goods' value. With the introduction of money as the universal legal tender, all goods acquired a numerical value, making math calculations even more important. Furthermore, in the competitive global market environment of today, businesses have to take advantage of every opportunity for profit, making frequent statistical market analyses a necessity.…

    • 1414 Words
    • 6 Pages
    Powerful Essays