CIS 502 Theories of Security Management

Topics: Security, Computer security, Information security Pages: 4 (2094 words) Published: November 2, 2014

WEE 7 CASE STUDY 3 : Mobile Devices Security

CIS 502 Theories of Security Management
February 22, 2013
Mobile Devices Security
By the end of 2013, there will be more mobile devices on Earth than people, a new report suggests. According to Cisco's Visual Networking Index Global Mobile Data Traffic Forecast Update, consumers' mobile appetite has grown a lot in the past year, and it shows no signs of slowing. In fact, Cisco predicts global mobile data traffic will increase 13-fold by 2017, with more than 10 billion mobile-connected devices by then (Murphy, 2013). Users of mobile devices have become dependent upon this technology not only for personal communications, but to conduct business transactions. This increase in commerce activity has had a corresponding increase in illegal activities geared toward taking advantages of mobile insecurities to steal consumer’s money and credentials. Mobile devices are convenient and are quickly catching up with personal computers as the choice to access the Internet. Unfortunately this convenience comes with a cost. Security for mobile devices has not kept up with the market growth and consumer use. In this paper I will discuss; 1) emerging cyber security issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report, 2) vulnerabilities of mobile devices in regard to usability and scale, and methods to mitigate the vulnerabilities of mobile devices, 3) the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices, 4) discuss Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches, 5) the greatest challenge in regard to controlling information online, and 6) Justify Dan Kuykendall’s statement about the biggest issue with mobile browsers and give two (2) examples illustrating his point. Emerging Cyber Security Issues and Vulnerabilities...

References: Gahran, A. (2011). Mobile phone security: What are the risks?. CNNTech. Retrieved from http://articles.cnn.com/2011-06-17/tech/mobile.security.gahran_1_android-app-android-phone-apple-s-app-store?_s=PM:TECH
Kahn, M. (2011). Equifax recognizes changing customer behavior with four-pronged mobile strategy. Mobile Marketer. Retrieved from http://www.mobilemarketer.com/cms/news/strategy/9733.html
Murphy, S. (2013). Mobile Devices Will Outnumber People by the End of the Year. Marshable. Retrieved from http://mashable.com/2013/02/06/mobile-growth/
Myserson, J. (2012). 5 Steps to Mitigate Device Vulnerabilities. The Mobility Hub. Retrieved from http://www.themobilityhub.com/author.asp?section_id=2303&doc_id=253570
Wolfe, H. (2010). Mobile Phone Security. The TSCM Journal. Retrieved from http://www.isaca-wellington.org/files/TSCM_Journal_1_2_Small.pdf
Sites, D & Tadimalla, A. (2011). A Survey of Mobile Device Security: Threats, Vulnerabilities, and Defenses. A Few Guys Coding Blogs. Retrieved from http://afewguyscoding.com/2011/12/survey-mobile-device-security-threats-vulnerabilities-defenses/
Zeus malware throws €36+ million lightning bolt across Europe. Infosecurity. Retrieved from http://www.infosecurity-magazine.com/view/29705/-zeus-malware-throws-36-million-lightning-bolt-across-europe/
Emerging Cyber Threats Report 2012. Georgia Tech Cyber Security Summit. Retrieved from http://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdf
PR: Mobile device attacks surge. Treasury & Risk. Retrieved from http://www.treasuryandrisk.com/2011/02/08/pr-mobile-device-attacks-surge
Samsung Kernel Crypto API Cryptographic Module v1.2. CSRC. Retrieved from http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1648.pdf
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Main Purpose of security management Essay
  • Essay on comparing theories of management
  • Comparisons of Information Security Management Frameworks Essay
  • Cis Memory Management Essay
  • CIS Midterm Essay
  • Management Plan for Security and Privacy Essay
  • Management Theory Essay
  • Management Theory Essay

Become a StudyMode Member

Sign Up - It's Free