logo

Security and Risk Assessment for Mobile Devices

11 Pages2676 Words85 Views
   

Added on  2023-01-11

About This Document

This document discusses the security and risk assessment for mobile devices, including the types of threats and vulnerabilities, security protection techniques, availability of web services using Apache, and the influence of employees on information security.

Security and Risk Assessment for Mobile Devices

   Added on 2023-01-11

ShareRelated Documents
Applied Project
Security and Risk Assessment for Mobile Devices_1
Table of Contents
Introduction.................................................................................................................................................3
Task 1..........................................................................................................................................................3
Specify types of threats within mobile devices and vulnerability to destruction and abuse.....................3
Security protection techniques and mitigation of risks within mobile devices.........................................4
Demonstrate how firm ensure availability of web service using Apache.................................................5
Influence of employees of information security.......................................................................................6
Illustrate Linux server auditing tools along with ways through which they can be used by MBC...........7
Task 2..........................................................................................................................................................8
Conception of two directories in Linux...................................................................................................8
Illustrate ways for creating three users....................................................................................................9
Conclusion.................................................................................................................................................10
References.................................................................................................................................................11
Security and Risk Assessment for Mobile Devices_2
Introduction
The assessment which comprises of recognizing risks within firm, technologies utilized
by them along with processes for verification that whether all the controls are in place for
safeguarding system against security threats is referred to as security and risk assessment. Here,
emphasis is laid on preventing applications from any kind of defects and associated
vulnerabilities (Arora and Gigras, 2020). For understanding security aspects that are being
experienced by firms, MBC is taken into consideration that is a broadcasting firm who has given
their employees with permission to make use of their own devices like mobile phones. This
report gives an insight into security aspects, vulnerabilities and ways in which they can be
mitigated. In addition to this, availability of servers will also be analyzed along with impact on
security policies by employees and distinct auditing tools are also mentioned.
Task 1
Specify types of threats within mobile devices and vulnerability to destruction and abuse
Viruses and spyware creates influence on laptop and PC’s similarly there are various threats
which create an impact on mobile phones. The risk that creates an influence on organization on
the whole as well as their network is referred to as security threat. Two major reasons are there
for these risks, physical (stealing of devices) and non-physical risks (virus attacks, ransomware,
malware, Trojan horse, etc.). The mobile security threats which can impact overall network of
MBC firm are illustrated below:
Application based threats: People usually download apps which seems appealing to them
and it is always not necessary that they are from authorized persons. This denotes that
applications do not illustrate whether they have ransomware or any other vulnerability within
them for conducting illegal activities (Brashear, 2020). In context of MBC, as employee’s makes
use of mobile phones and WiFi access of firm is being utilized, this denotes that one wrong app
can make entire network vulnerable. Some application threats are mentioned beneath:
Spyware: This is responsible for utilizing or collection of sensitive information of users
without their approval and even knowledge that some irrelevant activities are being
conducted within their devices. Basically, information which is being attacked is in the
messages, contact list, browser history, photographs, etc.
Security and Risk Assessment for Mobile Devices_3
Vulnerable applications: There are wide range of applications which have flaws within
them, it leads to exploitation of devices through which harmful activities are conducted.
Vulnerabilities assist attacker for furnishing access to private information. Malware: It denotes software that is responsible for conducting malicious operations
when they are being installed in mobile devices. They will make changes like sending
messages which will create an impact on their mobile phone bills, providing access to
third person to their accounts like Gmail or any other credential information stored within
them (Chopra and Chaudhary, 2020). This will be carried out without permission from
the user.
Web based threats: Mobile devices are mostly connected with internet for having access
to web services. Due to this different issues will be encountered by them in their mobile devices,
some of them are mentioned beneath:
Drive by downloads: It is liable for downloading applications automatically without
consent from mobile device owner. This is done when user visits the web page and it is
not essential they are being prompted to certain actions. Phishing scams: Facebook, text messages, email, instagram and Twitter is used to send
links for website. These links have been developed for tricking the users into their
webpage where they will enter their credentials and intruder will have those details (Ellis,
Hertig and Metscher, 2020). These are being used by them for carrying out
unauthenticated activities.
Security protection techniques and mitigation of risks within mobile devices
There are various organization that allow their employees to make use of mobile devices in the
working area. Some is done by MBC but they need to ensure that relevant strong policies and
security measures have been taken up by them to ensure that details about their network are not
accessed by third party or intruders. The reason behind this is that the threat associated with this
is very high as it is clear from above section (Hubbard, 2020). The methods that can be used by
MBC to ensure security of their operations are mentioned beneath:
Formulate of precise policies: When MBC allows mobile phones within working
structure, then need to ensure that adequate security policies have been developed. This
Security and Risk Assessment for Mobile Devices_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security and Risk Management
|13
|3408
|76

Ways to Secure Mobile Devices and Linux Web Servers
|9
|2857
|100

Security and Risk Management in MBC Organization
|7
|2046
|37

Types of Threats Against Mobile Devices and Security Protection Techniques
|8
|2120
|79

Cybersecurity and Linux Web Server
|8
|1965
|82

IS security and Risk Management
|16
|4607
|284