Risk of Mobile Technologies

Topics: Computer network, Wireless network, Wireless Pages: 2 (610 words) Published: January 29, 2012
Thoroughly identified the risks inherent in the use of wireless and mobile technologies. Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities. Thoroughly analyzed the identified risks and thoroughly developed factors to mitigate the risks. Understanding the risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. Maintaining secure wireless network is an ongoing process that requires greater effort that the required for other networks and systems. By assessing the risks, testing and evaluating system security controls for wireless networks more frequent can help prevent problems. There are many ways to improve the management of wireless or mobile technology like the following: * Creating backups of data frequently

* Preforming monthly...

References: Milligan, P., & Hutcheson, D. (2008). Business risks and security assessment for mobile devices, Audit and Control Association. www.isaca.org
Urbas, G., & Krone, T. (2006). Retrieved from Australian Government website:
Kim , D., & Solomon, M. (2012). Funsamentals of information system security. Ontario: Jones &Bartlett learning Canada.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay about Mobile Technology
  • Technology and Risks Essay
  • The Effects of Mobile Technology Essay
  • Essay about Centino Mobile Technology
  • Mobile Technology in Education
  • mobile Essay
  • Mobile Technology in Higher Education Essay
  • Risk Management in Information Technology Security Essay

Become a StudyMode Member

Sign Up - It's Free