logo

Security and Risk Management in MBC Organization

   

Added on  2023-01-12

7 Pages2046 Words37 Views
SECURITY AND RISK
MANAGEMENT

Table of Contents
INTRODUCTION...........................................................................................................................3
TASK 1............................................................................................................................................3
1. Define how mobile devices are vulnerable. Discussion on types of threats against mobile
devices. How these devices are vulnerable to destruction and abuse.........................................3
2. Justification on two types of security techniques for mobile devices and how they used to
mitigate threats. ..........................................................................................................................4
3. Assume MBC organisation used Linux web server to enterprise web site. Discussion on
how enterprise ensure availability of web service using Linux web server. ..............................4
Discussion on impact of employee on information security of MBC organisation. Risk
management recommendation to reduce risk of employee when they use mobile device for
work.............................................................................................................................................5
Define Linux server auditing tools and discuss how they can use to monitor and analyse the
web server. .................................................................................................................................6
CONCLUSION................................................................................................................................6
REFERENCES................................................................................................................................7

INTRODUCTION
Security risk management is termed out as the ongoing process that works as to identify
these security risk and execute the plans to address it (Han, 2020). On the other hand, Risk is
determined as considering the likelihood that defines that how the threats will exploit the
vulnerabilities and how these impact can be identified on valuable assets.
The present report will be based on MBC TV broadcasting organisation, it is firm that
allows their employees to use their own computing such as smartphone, laptops and tablet pc
etc. Furthermore, report will outline that how mobile devices are highly vulnerable and exposed.
Also, justification will be made on two kind of security protection techniques for mobile devices.
Lastly, discussion will be outline on the impact of employee on information security of the MBC
organisation.
TASK 1
1. Define how mobile devices are vulnerable. Discussion on types of threats against mobile
devices.
Vulnerabilities of mobile network based on available software or hardware flaws in the
web that interfaces the device and its application that assist to make mobile device helpless to
network (Wang, Rawal and Duan, 2020).
Types of mobile security threats-:
Mobile security threats inclusive of the both physical and software based fears that can be
negotiation the data on smartphone, tables and with parallel mobile device. In addition to this,
mobile security threats inclusive in the form of malware and spyware to the possible for illegal
contact to device information (Andrzejewski, 2020). Henceforth, mobile malware and spyware
security fears can contact the reserved data of the device deprived of taking the consent and prior
knowledge can also perform wicked action with the knowing of user. It leads to transfer the
control of device to hacker and sends unwanted messages to device's contacts.
Physical security threats- It lacks the passwords, screen locks and other procedures of
confirmation that are susceptible to illegal access. It can negotiation the sensitive data stored on
mobile device. If the device gets stolen, hackers cab bypass varied forms of verification in terms
to advance contact to sensitise information of the devices.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ways to Secure Mobile Devices and Linux Web Servers
|9
|2857
|100

Security and Risk Assessment for Mobile Devices
|11
|2676
|85

Cybersecurity and Linux Web Server
|8
|1965
|82

Security and Risk Management
|13
|3408
|76

Types of Threats Against Mobile Devices and Security Protection Techniques
|8
|2120
|79

IS Security and Risk Management
|14
|3442
|24