Order Now

Mobile Technologies Threat Matrix

Category:

No matching category found.

0 / 5. 0

Words: 275

Pages: 1

150

Name
Instructor
Course
Date
Mobile Technologies Threat Matrix
#Mobile or wireless threat What could be a legitimate use of this technology in the work environment? What could be a threat to an organizational network from the mobile or wireless device? Provide a minimum of one method of protecting against the threat.
1.Malware Organizations can use malware to test the level of their security against malware. Also, sometimes organizations may need to use malware to gain authorized access to a computer system if they are locked out from the system. If an employee uses an infected mobile phone to connect to a network in the workplace, the malware would make it easy for someone to steal the organization’s data. Organizations should make use of anti-malware controls to ensure the protection of mobile devices connecting to their networks.
2.Lost personal devices Bring Your Own Device (BYOD) is popular in many organizations because of the advantages of the initiative. For example, organizations save a lot of money that would have been used to purchase devices and in their maintenance (Singh 4). Allowing employees to bring their devices at the workplace puts the organizations security at risk in the event that an employee loses a device that used to connect to the organization’s network. It is only risky if an ill-intentioned person recovers the device. To protect against the threat organizations should have a way of remotely wiping the data on the device out before any person can use the device to against the organization.

Wait! Mobile Technologies Threat Matrix paper is just an example!

3.Leaky cloud Cloud-based technology is popular among organizations because it provides convenient ways of storing, sharing, managing, and accessing organization’s data. The organization’s security is at risk if employees use compromised personal devices to interact with cloud-based data. Using anti-malware controls in the organization would help detect compromised devices.

Works Cited
Singh, Niharika. “BYOD Genie is out of the Bottle–“Devil or angel”.” Journal of Business Management & Social Sciences Research 1.3 (2012): 1-12.

Get quality help now

Natalie Griffin

5.0 (391 reviews)

Recent reviews about this Writer

Your writing team is beyond incredible! I’m absolutely happy with the law paper I received.

View profile

Related Essays

The impact of happier employees

Pages: 2

(550 words)

Asthma And Its Main Causes

Pages: 5

(1445 words)

Health Promotion At The Workplace

Pages: 4

(1155 words)

software engineering/architecture

Pages: 4

(1100 words)

The Role Of Women In Msme Exports

Pages: 2

(438 words)

Sexual Harassment (North Country)

Pages: 2

(550 words)

Theory Paper

Pages: 4

(1100 words)

Intellectual Disability In Education

Pages: 8

(2315 words)