Mobile Device Security Risk Assessment
VerifiedAdded on 2020/03/23
|14
|3139
|41
AI Summary
This assignment delves into the crucial topic of mobile device security, requiring students to assess various risks associated with these devices. The analysis should encompass potential threats like malware, unauthorized access, data breaches, and vulnerabilities in operating systems and applications. Students are expected to propose effective mitigation strategies to minimize these risks, considering aspects such as strong passwords, encryption protocols, secure software updates, and user awareness training. The assignment emphasizes the importance of understanding and addressing mobile device security concerns in today's increasingly connected world.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
STP Business Continuity Report 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
STP Business Continuity Report 2
Executive Summary
This report presents STP, a company based in Wollongong whose main objective is to design
and create cabinets. Recently, STP has expanded to include branches in Sydney, Bathurst and
Lithgow. This paper outlines challenges in STP’s current information systems including lack
of access to updated information about its stock and deliveries. In addition, STP does not
have data on customer records. The paper states the proposed procedures to help STP achieve
its goals and expounds on the benefits of such changes. The scope, goal and strategic
alignment for the project has also been stated. Network security which also includes mobile
device security has been discussed in detail with measures on how to implement information
security outlined. The report also discusses on the necessary hardware and software necessary
to facilitate the proposed processes. The importance of business continuity planning has been
expounded as well as risk management and its significance for STP. A conclusion and
recommendations finalize the report.
Executive Summary
This report presents STP, a company based in Wollongong whose main objective is to design
and create cabinets. Recently, STP has expanded to include branches in Sydney, Bathurst and
Lithgow. This paper outlines challenges in STP’s current information systems including lack
of access to updated information about its stock and deliveries. In addition, STP does not
have data on customer records. The paper states the proposed procedures to help STP achieve
its goals and expounds on the benefits of such changes. The scope, goal and strategic
alignment for the project has also been stated. Network security which also includes mobile
device security has been discussed in detail with measures on how to implement information
security outlined. The report also discusses on the necessary hardware and software necessary
to facilitate the proposed processes. The importance of business continuity planning has been
expounded as well as risk management and its significance for STP. A conclusion and
recommendations finalize the report.
STP Business Continuity Report 3
Table of Contents
1.1 Introduction.....................................................................................................................4
1.2 Background......................................................................................................................4
1.5 Proposed Information Systems and BPR....................................................................5
1.7 Project Goal.................................................................................................................5
1.8 Project Strategic Alignment.............................................................................................6
1.9 Benefits of the Project for STP....................................................................................6
2.1 Network Security.................................................................................................................7
2.2 Securing Data..............................................................................................................7
2.3 Mobile Device Security...............................................................................................8
3.1 Plan for Software and Hardware Acquisition......................................................................9
4.1 Business Continuity Planning..............................................................................................9
5.1 Risk Management.................................................................................................................9
6.1 Conclusions........................................................................................................................10
7.1 Recommendations..............................................................................................................10
8.1 References..........................................................................................................................12
Table of Contents
1.1 Introduction.....................................................................................................................4
1.2 Background......................................................................................................................4
1.5 Proposed Information Systems and BPR....................................................................5
1.7 Project Goal.................................................................................................................5
1.8 Project Strategic Alignment.............................................................................................6
1.9 Benefits of the Project for STP....................................................................................6
2.1 Network Security.................................................................................................................7
2.2 Securing Data..............................................................................................................7
2.3 Mobile Device Security...............................................................................................8
3.1 Plan for Software and Hardware Acquisition......................................................................9
4.1 Business Continuity Planning..............................................................................................9
5.1 Risk Management.................................................................................................................9
6.1 Conclusions........................................................................................................................10
7.1 Recommendations..............................................................................................................10
8.1 References..........................................................................................................................12
STP Business Continuity Report 4
1.1Introduction
1.2 Background
Based in Wollongong, STP Company specializes in cabinet making. Recently STP has
expanded to office premises in Sydney, Bathurst and Lithgow. The company have in place
a state of the art computerised manufacturing facility to produce a wide range of cupboard
and drawer fronts that come with varied styles and colors. Their new equipment allow them
to produce new fronts much quicker. Cupboard and drawer fronts come complete with
fixings and handles so that that can easily be fixed by technicians. STP is also currently
considering having vans carrying samples of their product and staffed by people who can
install the products.
1.3 Existing Information System
STP has outgrown their current office arrangements. They also do not have customer
accounts as customers pay cash on ordering. Since, STP has recently expanded, they are
receiving a lot of enquiry from builders, developers and clients and need to implement
customer accounts. STP is also using an outdated stock control system which manages only
small stock. Communication between branches is limited and not streamlined. STP is also
using standard office software on standalone machines in each location which are not fit to
handle all their information requirements. STP does not have formal business processes and
relies on casual operations between builders and clients. There is no effective customer’s
management software and customers keep ringing to check their orders and are sometimes
fed with invalid information due to a limited stock control system. There are no means for
STP management to generate reports from existing business procedures.
1.4 Challenges of Existing System
1.1Introduction
1.2 Background
Based in Wollongong, STP Company specializes in cabinet making. Recently STP has
expanded to office premises in Sydney, Bathurst and Lithgow. The company have in place
a state of the art computerised manufacturing facility to produce a wide range of cupboard
and drawer fronts that come with varied styles and colors. Their new equipment allow them
to produce new fronts much quicker. Cupboard and drawer fronts come complete with
fixings and handles so that that can easily be fixed by technicians. STP is also currently
considering having vans carrying samples of their product and staffed by people who can
install the products.
1.3 Existing Information System
STP has outgrown their current office arrangements. They also do not have customer
accounts as customers pay cash on ordering. Since, STP has recently expanded, they are
receiving a lot of enquiry from builders, developers and clients and need to implement
customer accounts. STP is also using an outdated stock control system which manages only
small stock. Communication between branches is limited and not streamlined. STP is also
using standard office software on standalone machines in each location which are not fit to
handle all their information requirements. STP does not have formal business processes and
relies on casual operations between builders and clients. There is no effective customer’s
management software and customers keep ringing to check their orders and are sometimes
fed with invalid information due to a limited stock control system. There are no means for
STP management to generate reports from existing business procedures.
1.4 Challenges of Existing System
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
STP Business Continuity Report 5
The current existing has challenges including the following:
i. Lack of process integration
ii. Does not keep record of customer data and information
iii. Lack of up-to-date information for both staff and clients
iv. The existing system has no capacity to generate management reports
1.5 Proposed Information Systems and BPR
As a result of the challenges with the current systems at STP, it is important to install new
procedures by performing business process re-engineering in order to re-align business
operations with objectives of the business. It is also important to ensure that information in all
branches is streamlined and can be accessed real-time so that customers can get the right
information and for workers to access the right information. It is crucial to implement tools
and technologies for ensure that all business software’s are integrated together for efficiency
and effectiveness such as an enterprise resource planning (ERP) application. STP also needs
to install a methodology to help engage their customers such as a customer relationship
management (CRM) software.
1.6 Project Scope
This project will include all the branches of STP including the headquarter offices in
Wollongong and new branches in Sydney, Bathurst and Lithgow as well as focus on future
expansion for STP.
1.7 Project Goal
The goal of this project is to help STP achieve their strategic goals by doing the following
i. Implementing effective procedures through business process re-engineering (BPR)
The current existing has challenges including the following:
i. Lack of process integration
ii. Does not keep record of customer data and information
iii. Lack of up-to-date information for both staff and clients
iv. The existing system has no capacity to generate management reports
1.5 Proposed Information Systems and BPR
As a result of the challenges with the current systems at STP, it is important to install new
procedures by performing business process re-engineering in order to re-align business
operations with objectives of the business. It is also important to ensure that information in all
branches is streamlined and can be accessed real-time so that customers can get the right
information and for workers to access the right information. It is crucial to implement tools
and technologies for ensure that all business software’s are integrated together for efficiency
and effectiveness such as an enterprise resource planning (ERP) application. STP also needs
to install a methodology to help engage their customers such as a customer relationship
management (CRM) software.
1.6 Project Scope
This project will include all the branches of STP including the headquarter offices in
Wollongong and new branches in Sydney, Bathurst and Lithgow as well as focus on future
expansion for STP.
1.7 Project Goal
The goal of this project is to help STP achieve their strategic goals by doing the following
i. Implementing effective procedures through business process re-engineering (BPR)
STP Business Continuity Report 6
ii. Installing a customer relationship management solution in order to be able to create
and maintain customer accounts
iii. Implement an enterprise resource planning software solution in order to integrate
business systems
iv. Install data and information security procedures in order to ensure data security
v. Establish hardware and software acquisition and management procedures.
1.8 Project Strategic Alignment
Strategic alignment involves the process of making business operations parallel to business
objectives for efficiency and productivity (Advance Business Consulting, 2009). Thus, if
routine business operations match an organization’s goals, there results the achievement of
objectives and productivity. STP strategic goals include having an updated stock control
system, access to updated information and have effective business processes. Implementing
an integrated system, a customer relationship management and performing business process
engineering will help the business attain its strategic goals.
1.9Benefits of the Project for STP
The proposed business solutions will help the business achieve the following benefits
i. Implement effective business procedures to enable operation efficiency and
productivity
ii. System integration solutions will ensure data is centralized and updates and users
can access updated information from all the company branches
iii. Customer accounts will help STP to improve on customer experience and better
engage with customers
iv. Increased customer base with retention of existing customers and additional of
prospective clients
ii. Installing a customer relationship management solution in order to be able to create
and maintain customer accounts
iii. Implement an enterprise resource planning software solution in order to integrate
business systems
iv. Install data and information security procedures in order to ensure data security
v. Establish hardware and software acquisition and management procedures.
1.8 Project Strategic Alignment
Strategic alignment involves the process of making business operations parallel to business
objectives for efficiency and productivity (Advance Business Consulting, 2009). Thus, if
routine business operations match an organization’s goals, there results the achievement of
objectives and productivity. STP strategic goals include having an updated stock control
system, access to updated information and have effective business processes. Implementing
an integrated system, a customer relationship management and performing business process
engineering will help the business attain its strategic goals.
1.9Benefits of the Project for STP
The proposed business solutions will help the business achieve the following benefits
i. Implement effective business procedures to enable operation efficiency and
productivity
ii. System integration solutions will ensure data is centralized and updates and users
can access updated information from all the company branches
iii. Customer accounts will help STP to improve on customer experience and better
engage with customers
iv. Increased customer base with retention of existing customers and additional of
prospective clients
STP Business Continuity Report 7
v. Cost savings from better managed and operated procedures
2.1 Network Security
For a business to successfully manage its operations, it requires the setting up of a network
that include all the computing devices, technologies, tools and more to allow information
sharing and enhanced collaboration (Cisco, 2017).it is therefore crucial to ensure that an
organization’s network is secured from un-authorized persons and systems in order to protect
company data and information. There are many procedures that STP can use to implement
the network security for the systems.
2.2Securing Data
Data security involves protective measures used to stop illegal access to databases, network
websites and other systems (Techopedia, 2017). Securing data is a very important for STP in
order to ensure business continuity. Data security also information security measures will
therefore protect data for ATP from theft, deletion or corruption. Technologies to ensure
data security include technologies include data backup, data erasure, encryption techniques
(Techopedia, 2017). One of the major data security technique is encryption which involves
encrypting digital data for hardware, software, hard disks and other computing devices in
order to prevent access from hackers and illegal users (Sawle & Baraskar, 2016).
Data security can comprise of the following;
i. Data confidentiality will guarantee that data access will only be for approved
company staff through data security policies and procedures
ii. Data integrity will ensure that STP only works with accurate and valid data and that it
if secure from manipulations of any
v. Cost savings from better managed and operated procedures
2.1 Network Security
For a business to successfully manage its operations, it requires the setting up of a network
that include all the computing devices, technologies, tools and more to allow information
sharing and enhanced collaboration (Cisco, 2017).it is therefore crucial to ensure that an
organization’s network is secured from un-authorized persons and systems in order to protect
company data and information. There are many procedures that STP can use to implement
the network security for the systems.
2.2Securing Data
Data security involves protective measures used to stop illegal access to databases, network
websites and other systems (Techopedia, 2017). Securing data is a very important for STP in
order to ensure business continuity. Data security also information security measures will
therefore protect data for ATP from theft, deletion or corruption. Technologies to ensure
data security include technologies include data backup, data erasure, encryption techniques
(Techopedia, 2017). One of the major data security technique is encryption which involves
encrypting digital data for hardware, software, hard disks and other computing devices in
order to prevent access from hackers and illegal users (Sawle & Baraskar, 2016).
Data security can comprise of the following;
i. Data confidentiality will guarantee that data access will only be for approved
company staff through data security policies and procedures
ii. Data integrity will ensure that STP only works with accurate and valid data and that it
if secure from manipulations of any
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
STP Business Continuity Report 8
iii. Data availability will ensure that all the information STP need to perform operations
is accessible
iv. System authentication will confirm that employees have been approved as STP staff
members
v. System authorization will allow only certified persons to access and work with
company data, information and systems
2.3 Mobile Device Security
Advances in technology has enabled the development of mobile computing devices. Mobile
devices have become increasingly common and many people are using to do them personal
functions as well as they have become a critical tool in many modern organizations (Ayubi, et
al., 2016). With features including access to Internet mobile devices are increasingly being
used by staff in business organizations to perform operations in a technology referred to as
bring your own device (BYOD) (NIST, 2017). As such, in addition to traditional threats such
as viruses, worms, malware, and denial of service, for company networks, mobile devices are
more susceptible to attacks (Homeland Security, 2017). To ensure the security of mobile
devices that can be used in the company, STP requires to implement a framework for mobile
device strategy that expounds on analysis, design and actions (Brodin, 2017). It is therefore
very vital to ensure mobile device security in order to successfully perform business
operations. An emerging technology, mobile device management (MDM) is one of the
technologies in place to provide a solution to mobile device insecurity challenges (Barthwal,
2016). Mobile device management (MDM) provides organizations with the facility to
install, monitor, integrate secure and manage multiple mobile devices such as tablet
computers, smartphones, notebooks and personal digital assistants (PDA’s) (Barthwal, 2016).
STP can therefore implement mobile device management in order to ensure the security of
the entire computer network as well as the security for mobile devices. STP can implement
iii. Data availability will ensure that all the information STP need to perform operations
is accessible
iv. System authentication will confirm that employees have been approved as STP staff
members
v. System authorization will allow only certified persons to access and work with
company data, information and systems
2.3 Mobile Device Security
Advances in technology has enabled the development of mobile computing devices. Mobile
devices have become increasingly common and many people are using to do them personal
functions as well as they have become a critical tool in many modern organizations (Ayubi, et
al., 2016). With features including access to Internet mobile devices are increasingly being
used by staff in business organizations to perform operations in a technology referred to as
bring your own device (BYOD) (NIST, 2017). As such, in addition to traditional threats such
as viruses, worms, malware, and denial of service, for company networks, mobile devices are
more susceptible to attacks (Homeland Security, 2017). To ensure the security of mobile
devices that can be used in the company, STP requires to implement a framework for mobile
device strategy that expounds on analysis, design and actions (Brodin, 2017). It is therefore
very vital to ensure mobile device security in order to successfully perform business
operations. An emerging technology, mobile device management (MDM) is one of the
technologies in place to provide a solution to mobile device insecurity challenges (Barthwal,
2016). Mobile device management (MDM) provides organizations with the facility to
install, monitor, integrate secure and manage multiple mobile devices such as tablet
computers, smartphones, notebooks and personal digital assistants (PDA’s) (Barthwal, 2016).
STP can therefore implement mobile device management in order to ensure the security of
the entire computer network as well as the security for mobile devices. STP can implement
STP Business Continuity Report 9
mobile security management through the following procedures (Souppaya & Scarfone,
2013):
i. Implementing mobile device security policies and procedures
ii. Develop mobile devices threats system models
iii. Implementing and testing selected mobile device solutions before deploying them
iv. Regularly maintaining mobile device security
v. Fully securing all mobile devices before allowing company staff to use them
3.1 Plan for Software and Hardware Acquisition
STP needs to acquire the right hardware and software in order to achieve their strategic
objectives. Some of the factors that can influence the type of hardware or software procured
include the cost, compatibility, hardware/software support (Stephanie, 2016). Important
software and hardware requirements that STP needs in order to achieve their objectives
include
i. Enterprise resource planning (ERP) applications – these are software solution that
integrate business operations so that they can be combined and used together
including production, manufacturing, sales and marketing, servicing and more
(NetSuite, 2017). For STP ERP will allow system and process integration for
increased efficiency.
ii. Customer relationship management (CRM) - is software solution that is implemented
by businesses to assist with taking in and managing client engagement and
interactions for improved customer satisfaction and informed decisions. STP will be
mobile security management through the following procedures (Souppaya & Scarfone,
2013):
i. Implementing mobile device security policies and procedures
ii. Develop mobile devices threats system models
iii. Implementing and testing selected mobile device solutions before deploying them
iv. Regularly maintaining mobile device security
v. Fully securing all mobile devices before allowing company staff to use them
3.1 Plan for Software and Hardware Acquisition
STP needs to acquire the right hardware and software in order to achieve their strategic
objectives. Some of the factors that can influence the type of hardware or software procured
include the cost, compatibility, hardware/software support (Stephanie, 2016). Important
software and hardware requirements that STP needs in order to achieve their objectives
include
i. Enterprise resource planning (ERP) applications – these are software solution that
integrate business operations so that they can be combined and used together
including production, manufacturing, sales and marketing, servicing and more
(NetSuite, 2017). For STP ERP will allow system and process integration for
increased efficiency.
ii. Customer relationship management (CRM) - is software solution that is implemented
by businesses to assist with taking in and managing client engagement and
interactions for improved customer satisfaction and informed decisions. STP will be
STP Business Continuity Report 10
able to get a lot of information from CRM and be able to enhance customer orders
submission and processing
iii. Other integration software solutions – implement other applications that work
together with recommended software’s for enhanced operations
iv. Server Hardware – a server is used to serve client requests and for ERP and CRM
solutions to work effectively, they need servers for data storage and data management
(Dell, 2017)
v. Disk storage devices – storage information disks will enable STP to store all
information in one central location or single database for easy access (Techopedia,
2017).
4.1 Business Continuity Planning
Business continuity refers to the capability of an organization to continue with its operations
even after a calamity or disruptive circumstance (Business Continuity Institute, 2017). At
STP, business continuity will allow business processes that will help in identifying probable
threats and their influence on business operations and will provide frameworks for
developing business flexibility in terms of capacity to have effective responses that enables
organizational survival. In order to survive and achieve its objectives therefore, it is crucial
that STP creates a business continuity plan. Business continuity planning will help in better
responses towards attacks, natural disasters, hacking, hardware failure, software failure and
more, all of which focus on ensuring the business sustainability (SANS Institute, 2002).
5.1 Risk Management
A risk is well-defined as an indeterminate condition or event that, if it transpires, can result to
either positive or negative effects on project purposes (Hillson, 2004). Risk
able to get a lot of information from CRM and be able to enhance customer orders
submission and processing
iii. Other integration software solutions – implement other applications that work
together with recommended software’s for enhanced operations
iv. Server Hardware – a server is used to serve client requests and for ERP and CRM
solutions to work effectively, they need servers for data storage and data management
(Dell, 2017)
v. Disk storage devices – storage information disks will enable STP to store all
information in one central location or single database for easy access (Techopedia,
2017).
4.1 Business Continuity Planning
Business continuity refers to the capability of an organization to continue with its operations
even after a calamity or disruptive circumstance (Business Continuity Institute, 2017). At
STP, business continuity will allow business processes that will help in identifying probable
threats and their influence on business operations and will provide frameworks for
developing business flexibility in terms of capacity to have effective responses that enables
organizational survival. In order to survive and achieve its objectives therefore, it is crucial
that STP creates a business continuity plan. Business continuity planning will help in better
responses towards attacks, natural disasters, hacking, hardware failure, software failure and
more, all of which focus on ensuring the business sustainability (SANS Institute, 2002).
5.1 Risk Management
A risk is well-defined as an indeterminate condition or event that, if it transpires, can result to
either positive or negative effects on project purposes (Hillson, 2004). Risk
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
STP Business Continuity Report 11
management refers to the process of identifying, assessing and dealing with risks. The focus
of risk management is to guarantee that uncertainty does not affect business processes by
deflecting business goals (Dorfman, 2009). Risks can result from many situations including
threats, improbable financial markets, system failure, and lack of business processes, natural
disasters, credit risks, legal liabilities, attacks or nay unpredictable events. To ensure business
continuity therefore, it is important for STP to develop a risk management plan. Since STP is
heavily dependent on IT systems including a computerized solution to actualize business
operations, it would be crucial to plan against IT risks. To effectively handle risks, it would
be important for STP to follow the procedures of dealing with risks in an efficient manner
which including risk identification, risk analysis, responding to risks and risk control
according to (Rabechini & Monteiro de Carvalho, 2013) Some procedures that can be
implemented by STP to ensure business sustainability and continuity include:
i. Data backup and recovery in the event of data loss
ii. Insurance premiums for natural disasters
iii. Ensuring network and mobile device security
iv. Adopting new technologies that are geared to improve business productivity
6.1 Conclusion
The digital shift has transformed life as well as the working environment. New technologies
including cloud computing which is the access of software and services over the Internet,
Bring your device (BYOD), which allows employees to work using personal mobile devices
and the Internet of Things (IoT) which focuses on connecting objects together for
collaboration are some of the newest technologies changing the work environment. Thus, to
gain and maximize on a competitive advantage, it is important for business organizations to
adopt information technology developments.
management refers to the process of identifying, assessing and dealing with risks. The focus
of risk management is to guarantee that uncertainty does not affect business processes by
deflecting business goals (Dorfman, 2009). Risks can result from many situations including
threats, improbable financial markets, system failure, and lack of business processes, natural
disasters, credit risks, legal liabilities, attacks or nay unpredictable events. To ensure business
continuity therefore, it is important for STP to develop a risk management plan. Since STP is
heavily dependent on IT systems including a computerized solution to actualize business
operations, it would be crucial to plan against IT risks. To effectively handle risks, it would
be important for STP to follow the procedures of dealing with risks in an efficient manner
which including risk identification, risk analysis, responding to risks and risk control
according to (Rabechini & Monteiro de Carvalho, 2013) Some procedures that can be
implemented by STP to ensure business sustainability and continuity include:
i. Data backup and recovery in the event of data loss
ii. Insurance premiums for natural disasters
iii. Ensuring network and mobile device security
iv. Adopting new technologies that are geared to improve business productivity
6.1 Conclusion
The digital shift has transformed life as well as the working environment. New technologies
including cloud computing which is the access of software and services over the Internet,
Bring your device (BYOD), which allows employees to work using personal mobile devices
and the Internet of Things (IoT) which focuses on connecting objects together for
collaboration are some of the newest technologies changing the work environment. Thus, to
gain and maximize on a competitive advantage, it is important for business organizations to
adopt information technology developments.
STP Business Continuity Report 12
7.1 Recommendations
Computerized information systems are beneficial for businesses as they enable better
transaction recording, improved management reporting, enhanced decision making and
expert capabilities. As a result, they improve business operations efficiency and improve on
productivity and boost continuity. The information systems manager therefore recommend
that STP deploys the software and hardware systems discussed in the paper in order to
accommodate the recently experienced changes including expansion through new branches,
to improve on business operations, increase productivity and maximize business continuity.
These recommendations include:
i. ERP implementation
ii. CRM implementation
iii. Ensuring network and mobile devices security
iv. Developing risk management policies and procedures
7.1 Recommendations
Computerized information systems are beneficial for businesses as they enable better
transaction recording, improved management reporting, enhanced decision making and
expert capabilities. As a result, they improve business operations efficiency and improve on
productivity and boost continuity. The information systems manager therefore recommend
that STP deploys the software and hardware systems discussed in the paper in order to
accommodate the recently experienced changes including expansion through new branches,
to improve on business operations, increase productivity and maximize business continuity.
These recommendations include:
i. ERP implementation
ii. CRM implementation
iii. Ensuring network and mobile devices security
iv. Developing risk management policies and procedures
STP Business Continuity Report 13
8.1 References
Advance Business Consulting, 2009. What is Strategic Alignment?. [Online]
Available at: http://www.advancebusinessconsulting.com/advance!/strategic-alignment.aspx
[Accessed 5 October 2017].
Ayubi, S. et al., 2016. A Mobile App Development Guideline for Hospital Settings:
Maximizing the Use of and Minimizing the Security Risks of "Bring Your Own Devices"
Policies. JMIR mHealth and uHealth, 4(2).
Barthwal, D., 2016. Mobile Device Management (MDM) in Organizations. s.l.:Eastern
Institute of Technology .
Brodin, M., 2017. Mobile Device Strategy: From a Management Point of View. Journal of
Mobile Technologies, Knowledge and Society , 2017(1), pp. 2-3.
Business Continuity Institute, 2017. What is business continuity?. [Online]
Available at: http://www.thebci.org/index.php/resources/what-is-business-continuity
[Accessed 8 October 2017].
Cisco, 2017. Ten Tips for Making Your Business More Efficient. [Online]
Available at: https://www.cisco.com/c/en/us/solutions/small-business/resource-center/be-
more-productive/business-efficiency-tips.html
[Accessed 6 October 2017].
Dell, 2017. What is a server?. [Online]
Available at: http://www.dell.com/downloads/us/bsd/What_Is_a_Server.pdf
[Accessed 28 September 2017].
Dictionary, B., 2017. Business Dictionary. [Online]
Available at: http://www.businessdictionary.com/definition/strategic-alignment.html
[Accessed 28 September 2017].
Dorfman, M., 2009. Introduction to Risk Management and Insurance. 9th ed. Prentice Hal:
s.n.
Hillson, D., 2004. Effective opportunity management for projects : Exploiting positive risk..
New York: Marcel Dekker.
Homeland Security, 2017. Study on Mobile Device Security. [Online]
Available at: https://www.dhs.gov/sites/default/files/publications/DHS%20Study%20on
%20Mobile%20Device%20Security%20-%20April%202017-FINAL.pdf
[Accessed 4 October 2017].
NetSuite, 2017. Net Suite. [Online]
Available at: http://www.netsuite.com/portal/products/erp.shtml
[Accessed 28 September 2017].
NIST, 2017. Mobile Device Security. [Online]
Available at: https://nccoe.nist.gov/projects/building-blocks/mobile-device-security
[Accessed 4 October 2017].
8.1 References
Advance Business Consulting, 2009. What is Strategic Alignment?. [Online]
Available at: http://www.advancebusinessconsulting.com/advance!/strategic-alignment.aspx
[Accessed 5 October 2017].
Ayubi, S. et al., 2016. A Mobile App Development Guideline for Hospital Settings:
Maximizing the Use of and Minimizing the Security Risks of "Bring Your Own Devices"
Policies. JMIR mHealth and uHealth, 4(2).
Barthwal, D., 2016. Mobile Device Management (MDM) in Organizations. s.l.:Eastern
Institute of Technology .
Brodin, M., 2017. Mobile Device Strategy: From a Management Point of View. Journal of
Mobile Technologies, Knowledge and Society , 2017(1), pp. 2-3.
Business Continuity Institute, 2017. What is business continuity?. [Online]
Available at: http://www.thebci.org/index.php/resources/what-is-business-continuity
[Accessed 8 October 2017].
Cisco, 2017. Ten Tips for Making Your Business More Efficient. [Online]
Available at: https://www.cisco.com/c/en/us/solutions/small-business/resource-center/be-
more-productive/business-efficiency-tips.html
[Accessed 6 October 2017].
Dell, 2017. What is a server?. [Online]
Available at: http://www.dell.com/downloads/us/bsd/What_Is_a_Server.pdf
[Accessed 28 September 2017].
Dictionary, B., 2017. Business Dictionary. [Online]
Available at: http://www.businessdictionary.com/definition/strategic-alignment.html
[Accessed 28 September 2017].
Dorfman, M., 2009. Introduction to Risk Management and Insurance. 9th ed. Prentice Hal:
s.n.
Hillson, D., 2004. Effective opportunity management for projects : Exploiting positive risk..
New York: Marcel Dekker.
Homeland Security, 2017. Study on Mobile Device Security. [Online]
Available at: https://www.dhs.gov/sites/default/files/publications/DHS%20Study%20on
%20Mobile%20Device%20Security%20-%20April%202017-FINAL.pdf
[Accessed 4 October 2017].
NetSuite, 2017. Net Suite. [Online]
Available at: http://www.netsuite.com/portal/products/erp.shtml
[Accessed 28 September 2017].
NIST, 2017. Mobile Device Security. [Online]
Available at: https://nccoe.nist.gov/projects/building-blocks/mobile-device-security
[Accessed 4 October 2017].
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
STP Business Continuity Report 14
Rabechini, R. & Monteiro de Carvalho, M., 2013. Understanding the Impact of Project Risk
Management on Project Performance: an Empirical Study. Journal of Technology,
Management & Innovation, 8(Special Issue - ALTECH), pp. 68 - 70.
SANS Institute, 2002. Introduction to Business Continuity Planning. [Online]
Available at: https://www.sans.org/reading-room/whitepapers/recovery/introduction-
business-continuity-planning-559
[Accessed 8 October 2017].
Sawle, P. & Baraskar, T., 2016. Survey on Data Classification and Data Encryption
Techniques Used in Cloud Computing. International Journal of Computer Applications
(0975 – 8887), 135(12), pp. 35-40.
Souppaya, M. & Scarfone, K., 2013. NIST : Guidelines for Managing the Security of Mobile
Devices in the Enterprise. [Online]
Available at: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf
[Accessed 6 October 2017].
Stephanie, 2016. The 3 most important factors when buying computer software and
hardware. [Online]
Available at: https://www.myitpros.com/myitpros-blog/the-3-most-important-factors-when-
purchasing-computer-hardware-and-software
[Accessed 4 October 2017].
Techopedia, 2017. Storage device. [Online]
Available at: https://www.techopedia.com/definition/1119/storage-device
[Accessed 28 September 2017].
Techopedia, 2017. Techopedia. [Online]
Available at: https://www.techopedia.com/definition/26464/data-security
[Accessed 5 October 2017].
Rabechini, R. & Monteiro de Carvalho, M., 2013. Understanding the Impact of Project Risk
Management on Project Performance: an Empirical Study. Journal of Technology,
Management & Innovation, 8(Special Issue - ALTECH), pp. 68 - 70.
SANS Institute, 2002. Introduction to Business Continuity Planning. [Online]
Available at: https://www.sans.org/reading-room/whitepapers/recovery/introduction-
business-continuity-planning-559
[Accessed 8 October 2017].
Sawle, P. & Baraskar, T., 2016. Survey on Data Classification and Data Encryption
Techniques Used in Cloud Computing. International Journal of Computer Applications
(0975 – 8887), 135(12), pp. 35-40.
Souppaya, M. & Scarfone, K., 2013. NIST : Guidelines for Managing the Security of Mobile
Devices in the Enterprise. [Online]
Available at: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf
[Accessed 6 October 2017].
Stephanie, 2016. The 3 most important factors when buying computer software and
hardware. [Online]
Available at: https://www.myitpros.com/myitpros-blog/the-3-most-important-factors-when-
purchasing-computer-hardware-and-software
[Accessed 4 October 2017].
Techopedia, 2017. Storage device. [Online]
Available at: https://www.techopedia.com/definition/1119/storage-device
[Accessed 28 September 2017].
Techopedia, 2017. Techopedia. [Online]
Available at: https://www.techopedia.com/definition/26464/data-security
[Accessed 5 October 2017].
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.