Mobile Technologies Threat Matrix
Words: 275
Pages: 1
117
117
DownloadName
Instructor
Course
Date
Mobile Technologies Threat Matrix
#Mobile or wireless threat What could be a legitimate use of this technology in the work environment? What could be a threat to an organizational network from the mobile or wireless device? Provide a minimum of one method of protecting against the threat.
1.Malware Organizations can use malware to test the level of their security against malware. Also, sometimes organizations may need to use malware to gain authorized access to a computer system if they are locked out from the system. If an employee uses an infected mobile phone to connect to a network in the workplace, the malware would make it easy for someone to steal the organization’s data. Organizations should make use of anti-malware controls to ensure the protection of mobile devices connecting to their networks.
2.Lost personal devices Bring Your Own Device (BYOD) is popular in many organizations because of the advantages of the initiative. For example, organizations save a lot of money that would have been used to purchase devices and in their maintenance (Singh 4). Allowing employees to bring their devices at the workplace puts the organizations security at risk in the event that an employee loses a device that used to connect to the organization’s network. It is only risky if an ill-intentioned person recovers the device. To protect against the threat organizations should have a way of remotely wiping the data on the device out before any person can use the device to against the organization.
Wait! Mobile Technologies Threat Matrix paper is just an example!
3.Leaky cloud Cloud-based technology is popular among organizations because it provides convenient ways of storing, sharing, managing, and accessing organization’s data. The organization’s security is at risk if employees use compromised personal devices to interact with cloud-based data. Using anti-malware controls in the organization would help detect compromised devices.
Works Cited
Singh, Niharika. “BYOD Genie is out of the Bottle–“Devil or angel”.” Journal of Business Management & Social Sciences Research 1.3 (2012): 1-12.
Subscribe and get the full version of the document name
Use our writing tools and essay examples to get your paper started AND finished.