COMPUTERS SECURITY
Consider the following scenario: You are the manager of IT for a fast growing company. The company plans to take advantage of cutting edge technology as one of its
competitive approaches to gain market share. It is planning to equip its sales people with mobile devices to take orders from customers. In addition, it is planning to
enable its delivery and installation people to process credit card payments from customers upon delivery and installation of the systems, through a wireless credit
card payment processing system.
The company recognizes that there are security issues related to electronic transactions using mobile devices. Every time an employee submits a transaction, the
information is transferred from the mobile device to the appropriate department over an Internet connection. The company is also concerned that the personal use of
company mobile devices will put them at greater risk of malware and other forms of compromise. Loss of sensitive consumer information can result in loss of reputation
and potentially lead to legal actions against the company.
The Chief Information Officer (CIO) of the company has asked you to find a way to use mobile devices, in a secure way, to prevent data leakage.
Write a 5-page proposal that describes and evaluates applicable security management solutions for the company. Include the following points:
• Explain the security threats the employees’ mobile devices may be subjected to. For threats pertaining to electronic transactions, explain and justify
countermeasures.
• Based on the best practices for mobile security, describe which of these countermeasures you believe would be most effective. Justify your choices.
• Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to implement the solution.
Criterion Description Possible Points
Explanation The submission explains the threats to mobile devices. 25
Evaluation The submission describes the most effective countermeasures and justifies the selection. 25
Integration The submission integrates the effective countermeasures to propose a complete and effective security management solution. 30
Form and Style The report is well organized, includes grammatically correct, complete sentences that are free of spelling errors, and follows the APA style. 5
Total Points:85