Free Essay SamplesAbout UsContact Us Order Now

Mobile Technologies Threat Matrix

0 / 5. 0

Words: 275

Pages: 1

66

Name
Instructor
Course
Date
Mobile Technologies Threat Matrix
#Mobile or wireless threat What could be a legitimate use of this technology in the work environment? What could be a threat to an organizational network from the mobile or wireless device? Provide a minimum of one method of protecting against the threat.
1.Malware Organizations can use malware to test the level of their security against malware. Also, sometimes organizations may need to use malware to gain authorized access to a computer system if they are locked out from the system. If an employee uses an infected mobile phone to connect to a network in the workplace, the malware would make it easy for someone to steal the organization’s data. Organizations should make use of anti-malware controls to ensure the protection of mobile devices connecting to their networks.
2.Lost personal devices Bring Your Own Device (BYOD) is popular in many organizations because of the advantages of the initiative. For example, organizations save a lot of money that would have been used to purchase devices and in their maintenance (Singh 4). Allowing employees to bring their devices at the workplace puts the organizations security at risk in the event that an employee loses a device that used to connect to the organization’s network. It is only risky if an ill-intentioned person recovers the device. To protect against the threat organizations should have a way of remotely wiping the data on the device out before any person can use the device to against the organization.

Wait! Mobile Technologies Threat Matrix paper is just an example!

3.Leaky cloud Cloud-based technology is popular among organizations because it provides convenient ways of storing, sharing, managing, and accessing organization’s data. The organization’s security is at risk if employees use compromised personal devices to interact with cloud-based data. Using anti-malware controls in the organization would help detect compromised devices.

Works Cited
Singh, Niharika. “BYOD Genie is out of the Bottle–“Devil or angel”.” Journal of Business Management & Social Sciences Research 1.3 (2012): 1-12.

Get quality help now

Tylor Kearns

5,0 (387 reviews)

Recent reviews about this Writer

I couldn't be happier with the essay they delivered. The writer's in-depth analysis and impeccable writing style made it a joy to read.

View profile

Related Essays

Career Development Plan Workplace

Pages: 1

(275 words)

Business Communication Skill

Pages: 1

(275 words)

Insominia CBT

Pages: 1

(275 words)

Human Resources Research paper

Pages: 1

(275 words)

paragraph organization

Pages: 1

(275 words)

Discussion Homosexuality

Pages: 1

(275 words)

English Proposal Essay

Pages: 1

(275 words)

Script

Pages: 1

(275 words)