Contrastingly from technical and operational controls management controls are

Contrastingly from technical and operational controls

This preview shows page 11 - 14 out of 18 pages.

Contrastingly from technical and operational controls, management controls are administrative, and used when planning and assessing potential risks to provide a review of the organizations current ability to reduce potential and existing risks (Gibson, 2011). Management controls can be implemented in companies and personal use, for they are used in planning and assessments. Vulnerability assessments with mobile devices are an important management
Background image
Group Seven control technique in securing the privacy and protection of a mobile device. Vulnerability assessments identify current weaknesses within a mobile devices’ protection plan. These assessments allow for modifications in an attempt to reduce present risks (Gibson, 2011). These can consist of regular antivirus scans and risk assessments within the mobile device’s security regiment, such as passwords, pins, etc.Measures to secure mobile devices can consist of the use of multiple controls, in addition to their own built in capabilities such as device integrity, isolation, and protected storage to address the security concerns of the mobile device audience. When these capabilities are used appropriately, they provide protection against outside threats and malware. Desktop, laptop, and server securities have had longer security design windows than the mobile devices, allowing users and companies better abilities to protect their devices. Desktops and servers remain in one place and can be put behind a home or company firewall. On the other hand, a laptop or mobile device is constantly changing scenes, for example ranging from coffee shops to hotel lobbies. Laptops offer faster processing and more memory than mobile phones, which allows for more in-depth security. It also runs on the same operating system as the desktops and servers. In regards to mobile devices, it is only recently that hackers and other attackers are seeing mobile devices as a worthwhile exploit.Device integrity is the concept of trusting that the data users download or transmitted will remain exactly the same to the data the user received or sent. This includes accidental changes such as transmission errors or deliberate changes by outside attackers. Device integrity will continue to increase in popularity and become a standard in mobile phones. The iPhone App Store and Samsung’s Play store will also need to incorporate integrity into their software that is available for downloading to enhance device integrity for the user. In most cases a hashing
Background image
Group Seven algorithm can be utilized on the phone once the file is received to calculate if the file is outputting the same hash number as it was before downloading, thus upholding integrity. Another way of ensuring integrity would be to encrypt the data before transmitting ( a technique that is not the same as hard drive encryption mentioned below). This requires that both the phone and application program provide the same key to decrypt the file once it is received. While the
Background image
Image of page 14

You've reached the end of your free preview.

Want to read all 18 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture