Security and Risk Management: Mobile Device Vulnerabilities Report
VerifiedAdded on 2023/01/12
|7
|2046
|37
Report
AI Summary
This report delves into security and risk management, specifically focusing on the context of an MBC TV broadcasting organization where employees utilize their own devices. The report begins by defining mobile device vulnerabilities and discussing various types of threats, including malware, spyware, and physical security risks. It then justifies two security techniques, such as OS updates and encryption, for mitigating these threats. The analysis extends to the use of a Linux web server, discussing how the organization can ensure web service availability. Furthermore, the report examines the impact of employees on information security, providing risk management recommendations to reduce employee-related risks when using mobile devices for work. The report concludes by defining Linux server auditing tools and how they can be used to monitor and analyze the web server, offering a comprehensive overview of security and risk management practices.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

SECURITY AND RISK
MANAGEMENT
MANAGEMENT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
INTRODUCTION...........................................................................................................................3
TASK 1............................................................................................................................................3
1. Define how mobile devices are vulnerable. Discussion on types of threats against mobile
devices. How these devices are vulnerable to destruction and abuse.........................................3
2. Justification on two types of security techniques for mobile devices and how they used to
mitigate threats. ..........................................................................................................................4
3. Assume MBC organisation used Linux web server to enterprise web site. Discussion on
how enterprise ensure availability of web service using Linux web server. ..............................4
Discussion on impact of employee on information security of MBC organisation. Risk
management recommendation to reduce risk of employee when they use mobile device for
work.............................................................................................................................................5
Define Linux server auditing tools and discuss how they can use to monitor and analyse the
web server. .................................................................................................................................6
CONCLUSION................................................................................................................................6
REFERENCES................................................................................................................................7
INTRODUCTION...........................................................................................................................3
TASK 1............................................................................................................................................3
1. Define how mobile devices are vulnerable. Discussion on types of threats against mobile
devices. How these devices are vulnerable to destruction and abuse.........................................3
2. Justification on two types of security techniques for mobile devices and how they used to
mitigate threats. ..........................................................................................................................4
3. Assume MBC organisation used Linux web server to enterprise web site. Discussion on
how enterprise ensure availability of web service using Linux web server. ..............................4
Discussion on impact of employee on information security of MBC organisation. Risk
management recommendation to reduce risk of employee when they use mobile device for
work.............................................................................................................................................5
Define Linux server auditing tools and discuss how they can use to monitor and analyse the
web server. .................................................................................................................................6
CONCLUSION................................................................................................................................6
REFERENCES................................................................................................................................7

INTRODUCTION
Security risk management is termed out as the ongoing process that works as to identify
these security risk and execute the plans to address it (Han, 2020). On the other hand, Risk is
determined as considering the likelihood that defines that how the threats will exploit the
vulnerabilities and how these impact can be identified on valuable assets.
The present report will be based on MBC TV broadcasting organisation, it is firm that
allows their employees to use their own computing such as smartphone, laptops and tablet pc
etc. Furthermore, report will outline that how mobile devices are highly vulnerable and exposed.
Also, justification will be made on two kind of security protection techniques for mobile devices.
Lastly, discussion will be outline on the impact of employee on information security of the MBC
organisation.
TASK 1
1. Define how mobile devices are vulnerable. Discussion on types of threats against mobile
devices.
Vulnerabilities of mobile network based on available software or hardware flaws in the
web that interfaces the device and its application that assist to make mobile device helpless to
network (Wang, Rawal and Duan, 2020).
Types of mobile security threats-:
Mobile security threats inclusive of the both physical and software based fears that can be
negotiation the data on smartphone, tables and with parallel mobile device. In addition to this,
mobile security threats inclusive in the form of malware and spyware to the possible for illegal
contact to device information (Andrzejewski, 2020). Henceforth, mobile malware and spyware
security fears can contact the reserved data of the device deprived of taking the consent and prior
knowledge can also perform wicked action with the knowing of user. It leads to transfer the
control of device to hacker and sends unwanted messages to device's contacts.
Physical security threats- It lacks the passwords, screen locks and other procedures of
confirmation that are susceptible to illegal access. It can negotiation the sensitive data stored on
mobile device. If the device gets stolen, hackers cab bypass varied forms of verification in terms
to advance contact to sensitise information of the devices.
Security risk management is termed out as the ongoing process that works as to identify
these security risk and execute the plans to address it (Han, 2020). On the other hand, Risk is
determined as considering the likelihood that defines that how the threats will exploit the
vulnerabilities and how these impact can be identified on valuable assets.
The present report will be based on MBC TV broadcasting organisation, it is firm that
allows their employees to use their own computing such as smartphone, laptops and tablet pc
etc. Furthermore, report will outline that how mobile devices are highly vulnerable and exposed.
Also, justification will be made on two kind of security protection techniques for mobile devices.
Lastly, discussion will be outline on the impact of employee on information security of the MBC
organisation.
TASK 1
1. Define how mobile devices are vulnerable. Discussion on types of threats against mobile
devices.
Vulnerabilities of mobile network based on available software or hardware flaws in the
web that interfaces the device and its application that assist to make mobile device helpless to
network (Wang, Rawal and Duan, 2020).
Types of mobile security threats-:
Mobile security threats inclusive of the both physical and software based fears that can be
negotiation the data on smartphone, tables and with parallel mobile device. In addition to this,
mobile security threats inclusive in the form of malware and spyware to the possible for illegal
contact to device information (Andrzejewski, 2020). Henceforth, mobile malware and spyware
security fears can contact the reserved data of the device deprived of taking the consent and prior
knowledge can also perform wicked action with the knowing of user. It leads to transfer the
control of device to hacker and sends unwanted messages to device's contacts.
Physical security threats- It lacks the passwords, screen locks and other procedures of
confirmation that are susceptible to illegal access. It can negotiation the sensitive data stored on
mobile device. If the device gets stolen, hackers cab bypass varied forms of verification in terms
to advance contact to sensitise information of the devices.

Other type of security threats- There are some other as application that take the advancement
of vulnerabilities in the operating system of mobile or device such as mobile gain control of the
device, phishing scams etc.
2. Justification on two types of security techniques for mobile devices and how they used to
mitigate threats.
Mobile security best practices are termed out as to safeguard for protecting the mobile
devices and sensitive data that contain in the mobile device (Winkler, 2020). In addition to this,
mobile safety best practices can apply to mobile device that mainly used in business environment
as well personal use. Type of security techniques for mobile device as are-:
Update mobile with OS security patches- Mobile operating system inclusive of Apple IOS,
Google android platform and Microsoft window phone. It assists to deliver the regular informs to
operators that aids to undertake determination of security vulnerabilities and other kind of fears
to mobile security as well as this offer the features as additional security and performance
options (Wu, Wang and Yang, 2020). Henceforth, these kind of the upgrades are not always
updated on the automatically basis and users of mobile devices need to turn on the automatic
updates and app manually on regular basis.
Utilize encryption- There is need to utilise encryption for the data that needs to be kept on the
phone as for information in transit with secure techniques such as VPN. This is also termed out
as the one of effective and best security practices that never works as to transmit sensitive and
personal data over the public Wi-Fi spot especially when this is unsafe without the use of secure
communication option like VPN.
3. Assume MBC organisation used Linux web server to enterprise web site. Discussion on how
enterprise ensure availability of web service using Linux web server.
If the MBC organisation uses the Linux web server to enterprise website than it can aids
to ensure the high level of reliability that aids to accurate forecast the traffic. Linux web server
aids to provide the reliable, scalable, secure and high performance of the web site (Kuo,
Williams and Mohan, 2020). Linux is the best known and mostly used open source operating
system. In addition to this, Linux is the kind of software that work as to underneath all other
software on computer, to get the request from those programmes and this leads to relay these
request on computer hardware.
of vulnerabilities in the operating system of mobile or device such as mobile gain control of the
device, phishing scams etc.
2. Justification on two types of security techniques for mobile devices and how they used to
mitigate threats.
Mobile security best practices are termed out as to safeguard for protecting the mobile
devices and sensitive data that contain in the mobile device (Winkler, 2020). In addition to this,
mobile safety best practices can apply to mobile device that mainly used in business environment
as well personal use. Type of security techniques for mobile device as are-:
Update mobile with OS security patches- Mobile operating system inclusive of Apple IOS,
Google android platform and Microsoft window phone. It assists to deliver the regular informs to
operators that aids to undertake determination of security vulnerabilities and other kind of fears
to mobile security as well as this offer the features as additional security and performance
options (Wu, Wang and Yang, 2020). Henceforth, these kind of the upgrades are not always
updated on the automatically basis and users of mobile devices need to turn on the automatic
updates and app manually on regular basis.
Utilize encryption- There is need to utilise encryption for the data that needs to be kept on the
phone as for information in transit with secure techniques such as VPN. This is also termed out
as the one of effective and best security practices that never works as to transmit sensitive and
personal data over the public Wi-Fi spot especially when this is unsafe without the use of secure
communication option like VPN.
3. Assume MBC organisation used Linux web server to enterprise web site. Discussion on how
enterprise ensure availability of web service using Linux web server.
If the MBC organisation uses the Linux web server to enterprise website than it can aids
to ensure the high level of reliability that aids to accurate forecast the traffic. Linux web server
aids to provide the reliable, scalable, secure and high performance of the web site (Kuo,
Williams and Mohan, 2020). Linux is the best known and mostly used open source operating
system. In addition to this, Linux is the kind of software that work as to underneath all other
software on computer, to get the request from those programmes and this leads to relay these
request on computer hardware.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Therefore, this can be stated that one of the disadvantage of he Linux web server is that
this is the lack of support. On the other hand, this can be stated that Linux is the web server that
is the lack of proprietary software. Linux is the free and open source operating system. It is the
web server that is evolving of the versatile and can be used all over the world from web servers
to cell phones. In addition to this, this is the web server that provide the ways to web site to MBC
organisation by facilitating quick services to customers (Sehgal, Bhatt and Acken, 2020). Linux
provides the effective access to source code and alters the code as per requirements of users.
Windows do not have any kind of access to source code. Discussion on impact of employee on
information security of MBC organisation. Risk management recommendation to reduce risk of
employee when they use mobile device for work.
At the enterprise level, the threat security scares each employee. Henceforth, employees
need to be trained to be technical advancement and web server. Therefore, employees are
considered to be firm first part of the security (Sehgal, Bhatt and Acken, 2020). With the help of
result, this can be stated that employees' risk perception and reaction perception are positively
related to their cyber security behaviour. Thus, entity has wide range of confidential data that can
be stolen and image of the entity can get affected sue to it. Therefore, this can be said that
formation of the security risk is mainly comprises of the impacts to an organization and its
stakeholders that occur due to the threats and vulnerabilities connected with operation of the
entity and use of information systems and environments in which those systems operate.
Therefore, this can be said that Security Risk Management can be defined as the
continuing procedure that relates with recognizing these security risks and executing these plans
to address them. Also, risk can be determined with help of making an allowance for the
likelihood that use to investigate the threats and this will exploit weaknesses and the impact that
has on valued assets. Employee negligence towards the security can be one of biggest threat that
can affect working of the enterprise and this act can accidentally breach the sensitive data.
Recommendation-:
Employee should work as to monitor the malicious files. Each device used to support the
flexible workplace that uses to present the potential point of entry to hackers. In order to
cope up with, the employees need to continually monitor the presence of malware,
malicious code and other device that attacks throughout the critical file observing as this
is one of the crucial with help of which every remote device can be protected.
this is the lack of support. On the other hand, this can be stated that Linux is the web server that
is the lack of proprietary software. Linux is the free and open source operating system. It is the
web server that is evolving of the versatile and can be used all over the world from web servers
to cell phones. In addition to this, this is the web server that provide the ways to web site to MBC
organisation by facilitating quick services to customers (Sehgal, Bhatt and Acken, 2020). Linux
provides the effective access to source code and alters the code as per requirements of users.
Windows do not have any kind of access to source code. Discussion on impact of employee on
information security of MBC organisation. Risk management recommendation to reduce risk of
employee when they use mobile device for work.
At the enterprise level, the threat security scares each employee. Henceforth, employees
need to be trained to be technical advancement and web server. Therefore, employees are
considered to be firm first part of the security (Sehgal, Bhatt and Acken, 2020). With the help of
result, this can be stated that employees' risk perception and reaction perception are positively
related to their cyber security behaviour. Thus, entity has wide range of confidential data that can
be stolen and image of the entity can get affected sue to it. Therefore, this can be said that
formation of the security risk is mainly comprises of the impacts to an organization and its
stakeholders that occur due to the threats and vulnerabilities connected with operation of the
entity and use of information systems and environments in which those systems operate.
Therefore, this can be said that Security Risk Management can be defined as the
continuing procedure that relates with recognizing these security risks and executing these plans
to address them. Also, risk can be determined with help of making an allowance for the
likelihood that use to investigate the threats and this will exploit weaknesses and the impact that
has on valued assets. Employee negligence towards the security can be one of biggest threat that
can affect working of the enterprise and this act can accidentally breach the sensitive data.
Recommendation-:
Employee should work as to monitor the malicious files. Each device used to support the
flexible workplace that uses to present the potential point of entry to hackers. In order to
cope up with, the employees need to continually monitor the presence of malware,
malicious code and other device that attacks throughout the critical file observing as this
is one of the crucial with help of which every remote device can be protected.

Cloud based application- It is tool that crucial productivity tool for the mobile
workforce.
Each employee of the enterprise must provide training about the use of security that aids
to maintain the effective and efficient flow in working enterprise.
Define Linux server auditing tools and discuss how they can use to monitor and analyse the web
server.
In order to monitor Linux server, these are the built-in tools that can assist to collect all
performance data on an on-going basis to analysis and defect. Linux-based tools for security can
be termed out as boon to system admins. Linux software is termed out as the tools that assist to
audit server security and monitor the system. However, this can be stated that Monitoring is
essential as this assist the businesses to ensure a necessary system in proper manner (Sehgal,
Bhatt and Acken, 2020). Thus, Linux server can be monitored with help of tools such as Linux
Dash – Linux Server Performance Monitoring, Nagios – Linux Server Monitoring Tool Virtual
Memory Statistics and Wireshark.
CONCLUSION
Hereby, this can be concluded that security risk management can be defined as systematic
application of management policies, procedures, and practice within the enterprise. The present
report has covered the business activities such as MBC TV broadcasting organisation, it is firm
that allows their employees to use their own computing such as smartphone, laptops and tablet pc
etc. Furthermore, assignment has covered that how mobile devices are highly vulnerable and
exposed. Also, justification has been conducted on two kind of security protection techniques for
mobile devices. Lastly, discussion has been undertaken to identify the impact of employee on
information security of the MBC
workforce.
Each employee of the enterprise must provide training about the use of security that aids
to maintain the effective and efficient flow in working enterprise.
Define Linux server auditing tools and discuss how they can use to monitor and analyse the web
server.
In order to monitor Linux server, these are the built-in tools that can assist to collect all
performance data on an on-going basis to analysis and defect. Linux-based tools for security can
be termed out as boon to system admins. Linux software is termed out as the tools that assist to
audit server security and monitor the system. However, this can be stated that Monitoring is
essential as this assist the businesses to ensure a necessary system in proper manner (Sehgal,
Bhatt and Acken, 2020). Thus, Linux server can be monitored with help of tools such as Linux
Dash – Linux Server Performance Monitoring, Nagios – Linux Server Monitoring Tool Virtual
Memory Statistics and Wireshark.
CONCLUSION
Hereby, this can be concluded that security risk management can be defined as systematic
application of management policies, procedures, and practice within the enterprise. The present
report has covered the business activities such as MBC TV broadcasting organisation, it is firm
that allows their employees to use their own computing such as smartphone, laptops and tablet pc
etc. Furthermore, assignment has covered that how mobile devices are highly vulnerable and
exposed. Also, justification has been conducted on two kind of security protection techniques for
mobile devices. Lastly, discussion has been undertaken to identify the impact of employee on
information security of the MBC

REFERENCES
Books and Journals
Han, U.S.S., 2020, February. Information Security Risk Management in Electronic Banking
System. In 2020 IEEE Conference on Computer Applications (ICCA) (pp. 1-6). IEEE.
Wang, Y., Rawal, B.S. and Duan, Q., 2020. Develop Ten Security Analytics Metrics for Big
Data on the Cloud. In Advances in Data Sciences, Security and Applications (pp. 445-456).
Springer, Singapore.
Andrzejewski, K., 2020. Security Management Information System (No. 2641). EasyChair.
Winkler, R., 2020. MASSyPup64: Linux Live System for Mass Spectrometry Data Processing.
In Processing Metabolomics and Proteomics Data with Open Software (pp. 406-414).
Wu, F.X., Wang, F. and Yang, G.F., 2020. AIMMS suite: a web server dedicated for prediction
of drug resistance on protein mutation. Briefings in bioinformatics. 21(1). pp.318-328.
Kuo, H.C., Williams, D. and Mohan, S., 2020, April. A Linux in unikernel clothing.
In Proceedings of the Fifteenth European Conference on Computer Systems (pp. 1-15).
Sehgal, N.K., Bhatt, P.C.P. and Acken, J.M., 2020. Hands-On Project to Use Cloud Service
Provider. In Cloud Computing with Security (pp. 271-313). Springer, Cham.
Books and Journals
Han, U.S.S., 2020, February. Information Security Risk Management in Electronic Banking
System. In 2020 IEEE Conference on Computer Applications (ICCA) (pp. 1-6). IEEE.
Wang, Y., Rawal, B.S. and Duan, Q., 2020. Develop Ten Security Analytics Metrics for Big
Data on the Cloud. In Advances in Data Sciences, Security and Applications (pp. 445-456).
Springer, Singapore.
Andrzejewski, K., 2020. Security Management Information System (No. 2641). EasyChair.
Winkler, R., 2020. MASSyPup64: Linux Live System for Mass Spectrometry Data Processing.
In Processing Metabolomics and Proteomics Data with Open Software (pp. 406-414).
Wu, F.X., Wang, F. and Yang, G.F., 2020. AIMMS suite: a web server dedicated for prediction
of drug resistance on protein mutation. Briefings in bioinformatics. 21(1). pp.318-328.
Kuo, H.C., Williams, D. and Mohan, S., 2020, April. A Linux in unikernel clothing.
In Proceedings of the Fifteenth European Conference on Computer Systems (pp. 1-15).
Sehgal, N.K., Bhatt, P.C.P. and Acken, J.M., 2020. Hands-On Project to Use Cloud Service
Provider. In Cloud Computing with Security (pp. 271-313). Springer, Cham.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.