Preview

Risk of Mobile Technologies

Good Essays
Open Document
Open Document
610 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk of Mobile Technologies
Thoroughly identified the risks inherent in the use of wireless and mobile technologies.
Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.
Thoroughly analyzed the identified risks and thoroughly developed factors to mitigate the risks.
Understanding the risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. Maintaining secure wireless network is an ongoing process that requires greater effort that the required for other networks and systems. By assessing the risks, testing and evaluating system security controls for wireless networks more frequent can help prevent problems. There are many ways to improve the management of wireless or mobile technology like the following: * Creating backups of data frequently * Preforming



References: Milligan, P., & Hutcheson, D. (2008). Business risks and security assessment for mobile devices, Audit and Control Association. www.isaca.org https://docs.google.com/viewer?a=v&q=cache:rCt1m3UM18AJ:www.isaca.org/Journal/Past-Issues/2008/Volume-1/Documents/jpdf0801-business-risks.pdf+risk+inherent+in+using+mobile+and+wireless+technology&hl=en&gl=us&pid=bl&srcid=ADGEESgchcyiW7LOd-akV09EkMxXxd1VCumIKTw58NI7lN-xbA3vJ_Em37ErJgIG2BrGjlsxy6j1wT7j3U4ARwDDOGdiGVeGNN05pJ3Ljfp UeR4pzS5T49FrOr-xnPMFf-Kzzreojwin&sig=AHIEtbSeyo3aKqdZD3uk79VZzWkrHelkNQ Urbas, G., & Krone, T. (2006). Retrieved from Australian Government website: https://docs.google.com/viewer?a=v&q=cache:XuG2OtzcfBMJ:www.aic.gov.au/documents/E/9/9/%257BE99293FF-9E0F-4522-8E54-0598720C45B2%257Dtandi329.pdf+risk+of+wireless+and+mobile+technology&hl=en&gl=us&pid=bl&srcid=ADGEEShcsgs_t1p3InoPrVRj8zP9bLecXSi-GeXslZ2em5A76abYH3wtw3EyAynwG1QIqn-sTfizBnWbowmgKMnEW1nNIAyWWmbKv5ls8hI8s3juB4JhFQqZCsJkXdRKJPl GcjE0vBEP&sig=AHIEtbQZ9NmKUg9ECEV4V-xsKXD9QqgQwg Kim , D., & Solomon, M. (2012). Funsamentals of information system security. Ontario: Jones &Bartlett learning Canada.

You May Also Find These Documents Helpful

  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Task 3

    • 4254 Words
    • 17 Pages

    Develop mobile device policies/procedure. Implement security safeguards based on policies/procedure documents. Make sure network is designed with mobile devices in mind.…

    • 4254 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    The use of wireless technology in business and everday life is prevelant in today’s society as a whole. I have a wireless phone use, use Bluetooth and wireless internet on my laptop, as well as being able to transmit ans share internet, in my home and…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The internet has pervaded every aspect of business and Kudler Fine Foods has used it as a tool to further their goals. Wireless technology should be the next stepping stone for Kudler to use to advance in their field, and much like most new technologies the use of wirelessly connected devices can pose a number of security concerns. The benefits of having connectivity throughout the enterprise can outweigh the security concerns that wireless technology can pose. There are certain steps that can be taken to mitigate most of the concerns of having wirelessly connected devices on the network and these steps will be touched upon along with some of the major threats.…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Kim, D. , & Solomon, M. (2012). Fundamentals of Information Systems Security. Sudbury, MA: Jones & Bartlett Learning.…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Good Essays

    The technology is very productive when used in the workplace, as employees are able to access the required information for their respective jobs and at the time they require such information. It enables the field and remote workers to connect as soon as they reach at workplace. Since individuals stay in network connection, they are able to enter official information while moving (Paul-Lin, 2004). In this way it facilitates the productivity of employees at the workplace and thus enabling the organization to achieve their set objectives and missions to the public. Installation of wireless technology in the workplace gives the employees the freedom to move anywhere and anytime at their place of work or in a multi building while…

    • 586 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Dangers of Cell Phones

    • 1006 Words
    • 5 Pages

    I am sure that most of you own cell phones and that you can’t leave your home without it. And that all of you think of cell phones as one of the most useful devices of our time. Despite all that, have you ever considered dangers of using cell phones or thought about the harmful effects of the microwave radiations? (Pause) Just 10 years ago, cordless telephones were something used only by big businesses and privileged persons, but Nowadays; it seems that every kid in middle school carries a cell phone in their backpack. We are starting to get used to people seemingly talking to themselves everywhere. The benefits of cell phones are undoubtedly numerous; especially in emergency situations. However; technology that improves convenience, often has a destructive side, and Cell phones are no exception.…

    • 1006 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Mobile Computing Issues

    • 2189 Words
    • 18 Pages

    Introduction • There are several characteristics of wireless networks and mobile devices that give rise to issues that do not pose a problem in fixed, wired infrastructure. – Adaptive behaviour p – Battery power – Limitation on local resources – Small display size – Disparity in the availability of remote services – Unpredictable variation in QoS. Issues in Mobile Computing WRES3405 (3) 1 Adaptive Behaviour Effective use of smart space space. Invisibility. Localised scalability.…

    • 2189 Words
    • 18 Pages
    Good Essays
  • Good Essays

    Wifi- Health Effects

    • 1297 Words
    • 6 Pages

    What other devices emit microwave radiation? There are many other devices that emit the same radiation as Wi-Fi. These include:…

    • 1297 Words
    • 6 Pages
    Good Essays