StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Mobile Device Security Policies - Research Paper Example

Cite this document
Summary
The administrator formulates mobile device security policy to protect all the mobile devices and other software from unauthorized access, use,…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Mobile Device Security Policies
Read Text Preview

Extract of sample "Mobile Device Security Policies"

Management 9th February, Software restrictions The foremost objective of this essay is to look at how policies are put in place to restrict and protect the use of software. The administrator formulates mobile device security policy to protect all the mobile devices and other software from unauthorized access, use, disclosure, alteration, modification, deletion, destruction and removal.The purpose of these policies and restrictions is to ensure appropriate use of mobile devices and software. This is to secure sensitive and confidential information from compromise and reducing the risk of spreading viruses (Aksoy and Denardis, p 56).

It mitigates any other forms of software and device abuse such as use of pornographic materials. The policies and restrictions apply to all the users in a specified area which is covered with such a policy. This is to protect usage of network. The policies are enforced on anyone who uses the devices, and there are penalties for noncompliance which include civil or criminal litigation, restitutions and fines (Long and Long, p 91).The policies that might be proposed to protect mobile devices may include, but does not narrow to the following; There must be a password to protect every device (Negri, p63).

This is to limit its use to unauthorized persons. It should be a strong password, for example, eight characters in length. Another policy is ensuring physical security of the devices. This is to be ensured by the owners and any other authorized user and ensure the devices are always kept in a secure place (Bott, p 85). Another policy on mobile devices is that all sensitive and confidential documents stored should be encrypted to ensure security (Henten, p 13). It also ensures data is removed in case the device is to be disposed.

Mobile device options that are not in use should be disabled to ensure there are no breaches on any information. Screen locking and screen timeout should be implemented as a security policy. Mobile devices should be scanned for viruses this to protect deletion of files by the virus (Calhoun, p 62).Software restrictions policies are part of Microsoft security and management to help their customers to make their devices more reliable and manageable (May, p 32). The restrictions ensure that viruses are fought using the best ways possible to avoid loss of data.

The company also restricts which activeX controls can be downloaded. This is to ensure their users use only the recommended software (Panchal and Sabharwal, p 42). The company also insists on using scripts which are digitally signed. This reduces the risk of virus infection and loss of data. Restrictions also include enforcement of software installation rules which states that only approved software is installed on devices (Waterwoth, p 19). The company has a restriction policy of issuing certificates for use of software this is to ensure no unauthorized persons get access to the software.

There are also zone rules that help identify where a certain device is located. This include internet, intranet, restricted cites and trusted sites. The company has also introduced default rules, which dictate, the application execution. They include disallowed which block users executing application by default (Weiser and E. Jonathan, p 102).In conclusion, the design of mobile device security policy and software restrictions is to ensure better use of devices and software. Works citedAksoy, Pelin and Denardis, Laura.

Information technology in theory. London: course technology, 2007.Bott, Frank. Professional issues in information technology. London: British computer society, 2005.Calhoun, Ranoma. The use of computers information technology. London: Lap Lambert publishers, 2010.Henten, Anders. Regulation and the evolution of the global telecommunications industry. New jersey: Edward Elger pub, 2010.Long, Larry and Long Nancy. Computers: Information technology in perspective. USA:Pearson,2004.May, Randolph.

New direction in communication policy. Carolina: Carolina academic press, 2009.Negri, Raph. Communication policy: Theories and issues. New York: Palgrave Macmillan, 2010.Panchal,Sangeeta and Sabharwal,Alka. Computer science: Information technology. India: Oxford university press,2006.Waterworth. Multi-media interaction with computers (information technology). Michigan:Ellis Horwood, 2006.Weiser, Phillip and E. Jonathan. Digital crossroads: American telecommunications policy in the internet age.

New York: MIT press, 2007.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mobile Device Security Policies Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Mobile Device Security Policies Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1588860-mobile-device-security-policies
(Mobile Device Security Policies Research Paper Example | Topics and Well Written Essays - 500 Words)
Mobile Device Security Policies Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1588860-mobile-device-security-policies.
“Mobile Device Security Policies Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1588860-mobile-device-security-policies.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mobile Device Security Policies

Mobile Communication 1 and 2

What are the mobile device security related considerations that enterprises should take into account?... Some of the mobile device security related considerations include passwords, iTunes/iCloud, camera, Apps, Wi-Fi, Geological services, and Email.... mobile device management requires that the systems differentiate between enterprise and owner's data.... Candidate mobile device management platforms should support Android and iOS with management links to RIM's....
3 Pages (750 words) Essay

Mobile Device Management

mobile device management is one of the important and main tools/protocols of data communication.... mobile device management is the technology that not only encourages wide broadband of data transfer but also enhances the speed and mobility of the devices being attached to the network.... mobile device management has the capacity to remotely upgrade itself by changing a bit of its system's settings; it ensures security, data transfer, user friendliness and discourages sensitive information theft, fabrication or any other illegal act of company's policy....
8 Pages (2000 words) Essay

BYOD Security Concerns

Some scholars support that BYOD in relation to security concerns represents a paradigm change in utilization and management of terminal devices Based on above therefore, the following essay tries to explain how BYOD is of merits and demerits as far as security in an organization is concerned (Hayes 2013 pg114).... In addition, it enhances their security measures within the enterprise.... Thus, these sensitive data downloaded onto a personally owned device goes through easy sharing or get stored with less or no security....
5 Pages (1250 words) Research Paper

Integrated system design for cloud enterprise network and a secure BYOD

Such policies are such as mobile device management, application virtualization and containerization.... Despite the fact that using personal devices for BYOD causing security concerns, many organizations that have adopted BYOD implement a security policy for their networks to assist their respective Information Technology teams to quell such concerns.... Organizations have implemented several measures to boost their BYOD security....
2 Pages (500 words) Essay

Security Strategy: Exxon Mobil Security

The objective of this essay is to design a physical, personal, and information system(s) security plan for Exxon Mobil with the respective rationale for the defined security areas.... In addition, preliminary budget considerations for the aforementioned security plan would be proffered.... nbsp; In an organization, the role that security and safety assumes is of critical importance in safeguarding all the resources of the organization....
10 Pages (2500 words) Term Paper

Key Features of Cyber Security

This paper outlines the policies and procedures that can manage the vulnerability and threats in mobile computing.... The other aim of the study would be to describe the procedures and policies that can effectively facilitate managing the level of associated risk.... The effect on customer satisfaction due to the implementation of policies and procedures would also be evaluated.... The author of this coursework "Key Features of Cyber security" describes significant cybersecurity vulnerability and associated threats in mobile computing....
9 Pages (2250 words) Coursework

Integrating Mobile Device Management

… The paper "Using Samsung's KNOX and Its Capabilities in Integrating mobile device Management Solution " is a delightful example of a case study on information technology.... The paper "Using Samsung's KNOX and Its Capabilities in Integrating mobile device Management Solution " is a delightful example of a case study on information technology.... The report delves into the advantages of using KNOX and its capabilities in integrating mobile device Management Solution and specifically how the solution would make it possible for remote resources to be accessed securely....
9 Pages (2250 words) Case Study

The Global Communication Enterprises Strategy on Information Security

The paper "The Global Communication Enterprises Strategy on Information security" aims to share the GCE strategy on information security.... The main concern is on how information security within GCE will help the organization give protection to its newly developed product from its competitors.... The organization's administration should be structured in such a way that a relationship with external parties promotes an effective management policy to all information security aspects in the organization....
11 Pages (2750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us