Report on Mobile Security and Risk Management for MBC Organization

Verified

Added on  2022/09/25

|6
|1191
|17
Report
AI Summary
This report analyzes mobile security within the MBC TV broadcasting organization, which allows employees to use their own devices. It identifies key mobile security threats like data leakage and phishing attacks, explaining how applications can inadvertently leak sensitive data and how phishing exploits user vulnerabilities. The report proposes solutions, including strong encryption, data backups, and firewall software to secure devices. It also discusses securing the Linux web server using Apache, SSL, and HTTPS. Furthermore, the report recommends risk management strategies such as educating employees on cyber security, monitoring malicious files, and implementing security audit tools like Wireshark and Snort. The analysis covers the importance of comprehensive mobile security measures to protect the organization's data and systems.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: MOBILE SECURITY IN MBC ORGANIZATION
MOBILE SECURITY IN MBC ORGANIZATION
Name of the student:
Name of the university:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1MOBILE SECURITY IN MBC ORGANIZATION
Table of Contents
Answer 1....................................................................................................................................2
Answer 2....................................................................................................................................2
Answer 3....................................................................................................................................3
Answer 4....................................................................................................................................3
Answer 5....................................................................................................................................4
References..................................................................................................................................5
Document Page
2MOBILE SECURITY IN MBC ORGANIZATION
Answer 1
The organization of MBC TV broadcasting permits its employees to bring their
smartphones, laptops and other related gadgets with them into the company for professional
use. The organization also facilitates their employees to use the services of the information
systems. However, the smartphones through which the customers use such services are not
secured enough and incorporates various threats. Two of such mobile security threats are:
Data Leakage: The applications in the mobile are often the cause behind the unintentional
leakage of data. There exists certain applications that asks for broader permissions than
required and the users grant them without even checking security (Roman, Lopez and Mambo
2018). These apps are capable of sending data to their remote servers that are often mined by
the cyber hackers. Hence, this simple process can leak major confidential data of the user
such as bank account number easily.
Phising Attacks: This kind of threat is very common for mobile users because they track
their mails in real-time, however, cannot get the detailed information provided in the mail;
thereby respond to actions that might lead them to their loss.
Answer 2
Since mobile threats are a common phenomenon nowadays, the MBC organization can
secure the smart devices of their employees through these techniques:
Strong Encryption and Backup of Data: The organization can install strong encryption
algorithms in the smart devices before the employees use it for official purpose. The
encryption should be applied on customer data, employee data and all other relevant business
data. The encryption software should be able to lock the devices within two minutes of
inactivity, thereby ensuring protection of data extensively (Faruki et al. 2016). Backup of
Document Page
3MOBILE SECURITY IN MBC ORGANIZATION
data is also a necessary step along with encryption to fight against hacking because the
hackers not only tend to hack data but misuse it for malicious activities.
Using Firewall Software: The mobile devices of the employees should incorporate the
installation of firewall software because of the inefficiency of the anti-virus tools nowadays.
This firewall software excels in preventing the viruses to enter the database of the smart
devices at the first place, thereby ensuring a key feature to combat against cyber-attacks.
Answer 3
The web server of Linux is incorporated by various organizations worldwide, and
MBC organization of broadcasting TV is no exception. To ensure availability of the web
services through Linux web server in their organization, the company has to install first and
then configure the web services using Apache. Once the installation as well as the
configuration is done using Apache, the next step is to configure the virtual hosts and add
modules to it. However, the organization needs to secure its web services in the website and
thus, use SSL Linux security contexts to protect the web services from malicious hackers
(Raju and Govindarajulu 2016). The final step is to enable the HTTPS of Apache to allow the
users to navigate through the web services.
Answer 4
The MBC organization should take effective measures to manage mobile associated
risks as they allow their members use their own devices for the organizational activities.
Hence, certain recommendations to manage such risks are:
Educate the Employees about Cyber Security Measures: The organization should arrange
for training programs where they will train their employees about the protective measures in
cyber security such as malware protection, two-factor authentication, encryption and backup
of data (Mollah, Azad and Vasilakos 2017). If the employees are not aware of the pros and
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4MOBILE SECURITY IN MBC ORGANIZATION
cons of cyber security, they will not be able to make themselves aware about their secured
usage of mobile devices in the organization.
Monitor Malicious Files: The smart devices of the employees can end up with malware
anytime; hence, the organization should continuously track the critical files and ensure
protection of their real-time data (Peng et al. 2018). For this continuous supervision, the
company should consider implementation of remote security, automate the auditing trails and
install monitoring software that will ensure integrity of the files on real-time basis.
Answer 5
Implementation of Information Security is a necessity for the MBC organization and
thus, it can incorporate the security audit tools provided by the Linux server to secure their
data and devices. Two such recommended tools are:
Wireshark: Previously known as Ethereal, this security packet analyser proves to be
powerful for the administrators of the systems in the organization. It has the features to
capture IP packets live as well as browse the contents within the packet considering the
protocols.
Snort: Another famous security-auditing tool of Linux that is capable of detecting the
intruders in the system and highlighting their malicious attacks (Gunawan et al. 2018). Snort
is a powerful filter that analyses the packets and checks the attacks with its signature-based
detection, which Wireshark is not capable of doing.
Document Page
5MOBILE SECURITY IN MBC ORGANIZATION
References
Faruki, P., Fereidooni, H., Laxmi, V., Conti, M. and Gaur, M., 2016. Android code protection
via obfuscation techniques: past, present and future directions. arXiv preprint
arXiv:1611.10231.
Gunawan, T.S., Lim, M.K., Zulkurnain, N.F. and Kartiwi, M., 2018. On the Review and
Setup of Security Audit Using Kali Linux. Indonesian Journal of Electrical Engineering and
Computer Science, 11(1), pp.51-59.
Mollah, M.B., Azad, M.A.K. and Vasilakos, A., 2017. Security and privacy challenges in
mobile cloud computing: Survey and way ahead. Journal of Network and Computer
Applications, 84, pp.38-54.
Peng, M., Zeng, G., Sun, Z., Huang, J., Wang, H. and Tian, G., 2018. Personalized app
recommendation based on app permissions. World Wide Web, 21(1), pp.89-104.
Raju, P.B.S. and Govindarajulu, P., 2016. Performance Evaluation of Web Services In Linux
On Multicore. International Journal of Computer Science & Security (IJCSS), 10(4), p.161.
Roman, R., Lopez, J. and Mambo, M., 2018. Mobile edge computing, fog et al.: A survey
and analysis of security threats and challenges. Future Generation Computer Systems, 78,
pp.680-698.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]