CIS 502 Theories of Security Management

Topics: Security, Computer security, Information security / Pages: 7 (2094 words) / Published: Nov 3rd, 2014
WEE 7 CASE STUDY 3 : Mobile Devices Security

CIS 502 Theories of Security Management
February 22, 2013
Mobile Devices Security By the end of 2013, there will be more mobile devices on Earth than people, a new report suggests. According to Cisco 's Visual Networking Index Global Mobile Data Traffic Forecast Update, consumers ' mobile appetite has grown a lot in the past year, and it shows no signs of slowing. In fact, Cisco predicts global mobile data traffic will increase 13-fold by 2017, with more than 10 billion mobile-connected devices by then (Murphy, 2013). Users of mobile devices have become dependent upon this technology not only for personal communications, but to conduct business transactions. This increase in commerce activity has had a corresponding increase in illegal activities geared toward taking advantages of mobile insecurities to steal consumer’s money and credentials. Mobile devices are convenient and are quickly catching up with personal computers as the choice to access the Internet. Unfortunately this convenience comes with a cost. Security for mobile devices has not kept up with the market growth and consumer use. In this paper I will discuss; 1) emerging cyber security issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report, 2) vulnerabilities of mobile devices in regard to usability and scale, and methods to mitigate the vulnerabilities of mobile devices, 3) the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices, 4) discuss Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches, 5) the greatest challenge in regard to controlling information online, and 6) Justify Dan Kuykendall’s statement about the biggest issue with mobile browsers and give two (2) examples illustrating his point.
Emerging Cyber Security Issues and Vulnerabilities

References: Gahran, A. (2011). Mobile phone security: What are the risks?. CNNTech. Retrieved from Kahn, M. (2011). Equifax recognizes changing customer behavior with four-pronged mobile strategy. Mobile Marketer. Retrieved from Murphy, S. (2013). Mobile Devices Will Outnumber People by the End of the Year. Marshable. Retrieved from Myserson, J. (2012). 5 Steps to Mitigate Device Vulnerabilities. The Mobility Hub. Retrieved from Wolfe, H. (2010). Mobile Phone Security. The TSCM Journal. Retrieved from Sites, D & Tadimalla, A. (2011). A Survey of Mobile Device Security: Threats, Vulnerabilities, and Defenses. A Few Guys Coding Blogs. Retrieved from Zeus malware throws €36+ million lightning bolt across Europe. Infosecurity. Retrieved from Emerging Cyber Threats Report 2012. Georgia Tech Cyber Security Summit. Retrieved from PR: Mobile device attacks surge. Treasury & Risk. Retrieved from Samsung Kernel Crypto API Cryptographic Module v1.2. CSRC. Retrieved from

You May Also Find These Documents Helpful

  • Cis 105 Security Systems
  • Cis Memory Management
  • Operation Management (Mba-502)
  • Unit 502
  • Security Management
  • Cis 102 Assignment Security System
  • Unit 502
  • UNIT 502
  • Unit 502