COMPUTERS SECURITY

Please do only part one for this post after the approval of the instructor you will do the part two.
August 7, 2017
Behavioural sciences-Motivation
August 7, 2017
Show all

COMPUTERS SECURITY

COMPUTERS SECURITY

Consider the following scenario: You are the manager of IT for a fast growing company. The company plans to take advantage of cutting edge technology as one of its

competitive approaches to gain market share. It is planning to equip its sales people with mobile devices to take orders from customers. In addition, it is planning to

enable its delivery and installation people to process credit card payments from customers upon delivery and installation of the systems, through a wireless credit

card payment processing system.
The company recognizes that there are security issues related to electronic transactions using mobile devices. Every time an employee submits a transaction, the

information is transferred from the mobile device to the appropriate department over an Internet connection. The company is also concerned that the personal use of

company mobile devices will put them at greater risk of malware and other forms of compromise. Loss of sensitive consumer information can result in loss of reputation

and potentially lead to legal actions against the company.
The Chief Information Officer (CIO) of the company has asked you to find a way to use mobile devices, in a secure way, to prevent data leakage.
Write a 5-page proposal that describes and evaluates applicable security management solutions for the company. Include the following points:
•    Explain the security threats the employees’ mobile devices may be subjected to. For threats pertaining to electronic transactions, explain and justify

countermeasures.
•    Based on the best practices for mobile security, describe which of these countermeasures you believe would be most effective. Justify your choices.
•    Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to implement the solution.
Criterion    Description    Possible Points
Explanation    The submission explains the threats to mobile devices.     25
Evaluation    The submission describes the most effective countermeasures and justifies the selection.     25
Integration    The submission integrates the effective countermeasures to propose a complete and effective security management solution.    30
Form and Style    The report is well organized, includes grammatically correct, complete sentences that are free of spelling errors, and follows the APA style.    5
Total Points:85


Leave a Reply

Your email address will not be published. Required fields are marked *