Preview

Secure Mobile Device Management Deployment

Powerful Essays
Open Document
Open Document
5231 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Secure Mobile Device Management Deployment
| CITY University of Hong KongIS6523: Infrastructure & Security Management for E-Commerce | Secure Mobile Device Management Deployment | | | Team: The MoversTeam Member:CAI Ying, Vivian 52783116CHU Kachun, Gordon 52993003LI Yuanzhu, Mia 52710923PAN Junyu, Evan 52697226XI Lin, Linc 52707408FANG Jubin, Steven 52760822 |
1. Introduction

With the development of technology, we may confront the fact that mobility in business environment is becoming a more and more crucial element to determine the position of a corporation and its long-term profitability. Enhancing the use of mobile devices to improve the organization’s productivity comes to be the top priority of a business entity’s agenda, at the same time, security and risk concerns cannot be ignored.

Mobile Device Management solution provided by IT Solution Vendors such as SAP and Oracle has become a mainstream for managing mobile devices’ compliance of organizational IT policy and security. The objective of this paper consists of several components. First, we will reviews the currently available MDM solutions and select the best one based on predefined criteria. Second, we will determine the weakness and risk of the selected MDM. Third, we will incorporate some emerging technologies that will potentially eliminate the weakness and mitigate the risk of the selected MDM. Finally, we will evaluate the selected supporting technologies and provide improvement recommendation in order to create a more secure MDM deployment model.

We will start with security policy.

1.1 Policy

1.1.1 The Need for Policy

Mobile security is a combined concept, which involves multiple layers of security, including communication security, operations security and information security. Among all, information security stands out and we should pay enough attention to protect it. The C.I.A triangle was used to address the importance of three characteristics that give value to corporations (C stands for



References: [1] T. Dierks, E. Rescorla, "The Transport Layer Security (TLS) Protocol, Version 1.2", August 2008.  [2] A. Freier, P. Karlton, P. Kocher "The Secure Sockets Layer (SSL) Protocol Version 3.0". August 2011.  [3] Ray Stanton, “Securing VPNs: comparing SSL and IPsec”, Computer Fraud & Security, September 2005. [4] Ray Stanton, “Securing VPNs: comparing SSL and IPsec”, Computer Fraud & Security, September 2005.

You May Also Find These Documents Helpful

  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    There are many threats a network faces when the IT department allows students to connect to the network or Internet using mobile devices. Some threats affect the campus network only, while other threats directly affect students or employees. For the campus network, threats include…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    ____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Better Essays

    Mobile use has become increasingly popular because of the advances in phone, tablet and laptop technology. Kudler Fine Foods must embrace this new technology not only to use it to further their business goals but to also address the security concerns that it poses. Allowing mobile use on the organizational network would mean using wireless connectivity, this opens up the network to a number of threats such as:…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Securing Mobile Devices. (n.d.). Information Technology - Information Security – Information Assurance | ISACA. Retrieved from http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Securing-Mobile-Devices.aspx…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Cyber space is any area where data and information is electronically stored or filtered through that can be accessed via a variety of networks, programs, and systems. Cyber is all measures put in place to ensure appropriate use and protection for that information. It is important for organizations to ensure their networks and components within those networks are secure. Each connection to the internet, and each user of the network is a vulnerability to that network. In today’s economy with corporate scandals, government crackdowns, financial cutbacks, and new implementation of policy the single most important vulnerability facing IT managers today is the idea of bring your own device (BYOD).…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones and Bartlett.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Means of enforcement of security policy should be a primary consideration throughout the research, test and implementation phases of any security technology. Careful research, review of manufacturer’s documentation, questions presented to vendors and manufacturers, and testing of the technology can serve to meet this criteria. Without a method of enforcement, effectiveness of security policy is questionable at best. While audit trails, hardware analysis and security logs should be reviewed regularly; it is a time-intensive process and this alone alerts the administrator to violations and security threats…

    • 601 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Kim, David and Solomon, Michael G., 2012, Fundamentals of Information Systems Security, CH 7.p.235 and CH10. P.335.…

    • 1574 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Privacy and Security

    • 4774 Words
    • 20 Pages

    Thibadeau, 2002, Workshop on the Relationship between Privacy and Security, p5, para.6, viewed 24 April 2013, <http://rack1.ul.cs.cmu.edu/tw/privacy/WhitePaperPWS.PDF>.…

    • 4774 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Bibliography: Kim, David and Michael G. Solomon. “Fundamentals of Information Systems Security.”, 15-42. Sunbury, MA: jones and Bartlett Learning, 2012.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    The number of mobile applications is expected to reach $75B with 70% of the applications geared towards smart phones (Joseph, 2009). Not only are commercial, civic and private organizations utilizing this technology, armatures worldwide have also engaged this technology adding thousands of other unique applications to the thousands currently available. Organizations whether they are civic, commercial or private must join the mobile revolution to remain competitive and relevant.…

    • 3576 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    References: Dierks, T. and Rescorla, E. (2008). The transport layer security (TLS) protocol version 1.2. Internet engineering task force. Retrieved from http://tools.ietf.org/html/rfc5246…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Byod Pro's and Con's

    • 2327 Words
    • 10 Pages

    “Forrester Research reported in July of 2011 that nearly 60 percent of companies allow employees to use personal devices for work. “Bring Your Own Device (BYOD)” policies allow employees maximum choice and flexibility but raise new challenges in maintaining the personal privacy of the user, managing and securing valuable corporate information assets, and providing IT with an unpredictable and inconsistent mobile environment. There are also mobile technology considerations, while mobile devices are surpassing PCs and laptops as a user’s primary computing platform, they do have limited access to power, network and hardware resources. Devising a BYOD solution that will support both personal and business roles requires attention to all of these challenges”.…

    • 2327 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    Ssh/Tls

    • 5132 Words
    • 21 Pages

    6. T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard), January 1999. Obsoleted by RFC 4346, updated by RFCs 3546, 5746, 6176.…

    • 5132 Words
    • 21 Pages
    Best Essays