Business Risks And Security Assessment

Powerful Essays
Proceedings of the 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics, Vancouver, Canada, June 19-21, 2007

189

Business Risks and Security Assessment for Mobile Devices
PATRICIA MAYER MILLIGAN
Information Systems Department
Baylor University
Waco, Texas
USA
pati_milligan http://business.baylor.edu/pati_milligan/
DONNA HUTCHESON
Director of It Audit
TXU Corporation
Dallas, Texas
USA
dhutche1 http://www.txu.com
Abstract: - Technology advances over the past decade have elevated business risk from mobile devices to an unparalleled high. The relationships between security, business risks, and their corresponding costs are increasingly complex. Corporate security measures have lagged behind the need for protection. Bottom line security relies on the individual business professional is ethics and diligence in protecting confidential corporate, market, and customer information. This paper identifies and compares the various business risks, assesses prevalent security solutions, and analyzes the total cost of corporate mobile technology.
Key-Words: - Security, Wireless, Smart phone threat, PDA threat, Network threat, Business risk, Malware

1 Introduction
Computing technology advances in the past decade have created a much more flexible corporate work environment. This flexibility is reflected in small mobile devices that are easy to use, provide the ability to receive and make phone calls and voice messages, send and receive emails and instant messages, access the intranet, surf the internet, and access business applications. These capabilities are available whether you are out of the office or out of the country.
Wireless devices make geographic distance a nonissue. Flexibility is also reflected in extremely small mass storage devices. Up to 4 GB of data (equating to approximately 80,000 boxes of paper) can be as small as a pen.
Mobile
technology has enabled greater productivity, availability, and convenience to business professionals and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Business Risk Assessment

    • 1324 Words
    • 6 Pages

    Business Risk Assessment from the Oklahoma Commercialization Model How to Properly Identify Risk ©2007 i2E, Inc. Table of Contents ©2007 i2E, Inc. 1)Overview2)Investigation Stage3)Feasibility Stage4)Development Stage5)Introduction Stage6)Growth Stage7)Maturity Stage8)Commercialization SpecialistsResources: •The Oklahoma Commercialization Model•Angel Capital Education Foundation•Tech Coast Angels•i2E Team It’s important to analyze your business opportunity with respect to five…

    • 1324 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Risk Assessment

    • 1733 Words
    • 7 Pages

    Defense Logistics Information Service (DLIS) Outline 1. Introduction a. Scope b. Assign to departments c. Risk Matrix d. Risk mitigation plan e. Impact Analysis 2. (BIA) a. Departments b. Business Impact c. Costs Analysis 3. Recommendations (BIA) a. Business Impact Analysis Results b. Maximum Acceptable Outage 4. (DLIS) Business Continuity Plan a. Purpose b. Scope c. Plan Objectives d. Disaster definition e. Recovery teams f. Team member responsibilities g. Instructions…

    • 1733 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Risk Assessment

    • 1788 Words
    • 8 Pages

    A Risk Assessment of FedEx Corporation Marvin Conley CIS RISK MANAGEMENT & STRATEGIC PLANNING CMGT/585 Mr. Sardoni June 12, 2006 Abstract Many organizations perform risk assessments to measure the amount of risks that could impact their organization, and identify ways in treating them before a major disaster occurs. Risks involve theoretical effectiveness of security measures, loss of impact, threats and vulnerabilities that are common in today's society. FedEx Corporation follows guidelines…

    • 1788 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Risk Assessment

    • 1519 Words
    • 7 Pages

    very crucial for customs, and there security as well as transport companies, agents, imports, In this most common problem is customs interactions and lack of knowledge about new software. When there is interactive session , the data was visible on that time the possibility is data integrity. There are some issues with wastage of money due to insufficient capacity in ports. So there will arise non technical and technical issues. Without the awareness of data security and lack of knowledge about new…

    • 1519 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Security Assessment

    • 856 Words
    • 3 Pages

    Assignment 1: Security Assessment If I were to be hired as a consultant to perform a network security assessment for a large firm, there are a few things that I would have to keep in mind to provide my client with the best outcome possible. I would fist begin by explaining what a security risk assessment is to the client. I will explain that the security risk assessments that will be utilized is basically used to recognize the chance that there is an openness that can be exploited…

    • 856 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Security Assessment Amanda (Mandy) Jensen CJS/250 6/13/2014 Dr. Gale Tolan Security Assessment Associate Level Material Appendix B Security Assessment Directions: Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate…

    • 824 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Risk Assessment

    • 768 Words
    • 3 Pages

    Risk Assessment Jonathan Hanning IS3110 James Hollis Abstract You have just left a four hour meeting where you described the network expansion project to your colleagues. You explained the architecture, new enterprise level firewall, the additional requirements for network monitoring and maintenance, the need for an additional system administrator, and the risks of not complying with Federal Information Security Management Act (FISMA) regulations for securely trading with the U.S. Government.…

    • 768 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    risk assessment

    • 4141 Words
    • 17 Pages

    5CI003 IT Risk Analysis ASSIGNMENT Submission (Sem 1 – 2013-14) Lastname : Mark Firstname: Bash Student Number: 1124409 Declaration : I declare that this submission is my own work and has not been copied from someone else or commissioned to another to complete. Any materials used in this work (whether from published sources, the Internet or elsewhere) have been fully acknowledged and referenced and are without fabrication or falsification of data. I have adhered to relevant…

    • 4141 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Risk Assessment

    • 1252 Words
    • 6 Pages

    Risk Assessments A risk assessment is an examination of what work could cause harm to people. This will help to see whether there have been enough precautions taken or a need for more to prevent harm. Employees have a right to be protected at from harm caused by a failure to take reasonable control measures. Accidents and ill health can affect a business if output is lost, machinery is damaged, insurance costs increased and possibly even having to go to court. It is a legal requirement to assess…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Risk Assessment

    • 362 Words
    • 2 Pages

    MERCER PAINTS RISK ASSESSMENT VULNERABLITES Mercer paints computer system has a few vulnerabilities. The first vulnerability is threat by hackers, which data can be stolen, corrupted, or destroyed by these individuals. User errors are next highest exposure that deal with operation of automated systems requires specializes to do update to programs, which in turn makes it easy to make errors within the programs. If the program is not properly protected, it can be easy for someone to make unauthorized…

    • 362 Words
    • 2 Pages
    Satisfactory Essays