StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

1: Mobile Devices - Case Study Example

Cite this document
Summary
Without a doubt, it offers an excellent support for the businesses to generate revenue and improve business processes. Additionally, at the present, computers, other systems, devices,…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Case Study 1: Mobile Devices
Read Text Preview

Extract of sample "1: Mobile Devices"

CASE STUDY MOBILE DEVICES Case Study Mobile Devices Affiliation Table of Contents Risks Inherent In the Use of Wireless and Mobile Technologies 3Plan for Monitoring and Analysis 4Backups 4Services installed 4Firewall 5Strong Password 5Recommendation 5References 6IntroductionWireless technology offers a number of advantages for the businesses as well as individuals. Without a doubt, it offers an excellent support for the businesses to generate revenue and improve business processes. Additionally, at the present, computers, other systems, devices, such as PDAs and smart phones can be connected wirelessly.

However, a un-protected wireless connection can create a risk of hackers to access our impotent and private files and information, and it allows strangers to utilize our internet connection for completing negative tasks. In this scenario, this report will outline some of the major risks and issues regarding information and network security in the context of the doctor’s office. Risks Inherent In the Use of Wireless and Mobile Technologies We can face a wide variety of issues and problems while using wireless technology at the doctor’s clinic.

Given below are some of the important issues: (Phifer, 2010; PrivateInternetAccess, 2012)Data Interception: Security based attack at business network can cause theft of information and as a result damage corporate data. Denial of Service: In such kind of attacks the company network is engaged in a constant working situation where no new user can connect and work due to heavy load of network processes. Wireless Intruders: In this kind of security attack, wireless signals are captured and intruded for damaging the business working and hacking secret information.

Misbehaving Clients: Users who establish illegal and unauthorized wireless link of some kind, whether by chance or deliberately, place themselves and corporate data at risk. Endpoint Attacks: This kind of security attacks are designed for network wireless endpoints. So, it can affect different users working at the clinic.Mitigating RisksThis section discusses the procedures for the mitigation of above mentioned risks. There are some counter measures that can be adopted by the clinic to protect and defend the corporate network and operational setup:Plan for Monitoring and AnalysisThis section presents some of important initiatives that need to be taken by the clinic to better deal with security risks due to internal or external access: Backups We need to establish off-site storage space for taking backup of corporate data and information to ensure a high level of data security (Magalhaes, 2004).

Services installedWe need to install security and privacy services which are purposefully designed to restrict attacker who attempt to get access and incorporate some vulnerabilities inside our wireless network (Danchev, 2003). FirewallWe need to install firewall for the protection of wireless network (Danchev, 2003) Strong Password We also need to ensure the implementation of strong passwords for effective security and privacy management at the doctor’s clinic (Danchev, 2003). RecommendationWe need to take a number of actions in order to deal with security attacks at the doctors office.

We need to implement a disaster recovery plan to deal with any internal or external security attack. In fact, the application of such security management mechanisms will offer an excellent support for fighting against any technology based disaster. We can also take following actions to ensure the security in a much better way: (ICO, 2012) (Lehembre, 2005)Encryption of data Altering the wireless network’s default nameHide network IDSelecting strong passwordDo not auto-connect to wireless signalsReferences Danchev, D. (2003). Building and Implementing a Successful Information Security Policy.

Retrieved October 23, 2012, from WindowsSecurity.com: http://www.windowsecurity.com/pages/security-policy.pdfICO. (2012). Wi-Fi security. Retrieved October 23, 2012, from http://www.ico.gov.uk/for_the_public/topic_specific_guides/online/wifi_security.aspxLehembre, G. (2005). Wi-Fi security – WEP, WPA and WPA2. Retrieved October 23, 2012, from http://www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_EN.pdfMagalhaes, R. M. (2004, July 23). Hardening Windows NT/2000/XP Information Systems.

Retrieved October 19, 2012, from WindowsSecurity.com: http://www.windowsecurity.com/articles/Hardening_Windows_NT2000XP_Information_Systems.htmlPhifer, L. (2010, March 08). Top Ten Wi-Fi Security Threats. Retrieved October 20, 2012, from http://www.esecurityplanet.com/views/article.php/3869221/Top-Ten-WiFi-Security-Threats.htmPrivateInternetAccess. (2012). Public Wifi Security. Retrieved October 23, 2012, from https://www.privateinternetaccess.com/pages/public-wifi-security/

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Case Study 1: Mobile Devices Example | Topics and Well Written Essays - 500 words”, n.d.)
Case Study 1: Mobile Devices Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1606031-case-study-1-mobile-devices
(Case Study 1: Mobile Devices Example | Topics and Well Written Essays - 500 Words)
Case Study 1: Mobile Devices Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1606031-case-study-1-mobile-devices.
“Case Study 1: Mobile Devices Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1606031-case-study-1-mobile-devices.
  • Cited: 0 times

CHECK THESE SAMPLES OF Case Study 1: Mobile Devices

Applying Green IT Strategies and Applications to Wal-Mart

hellip; The biggest advantage that mobile devices incur into the business of Hyper Star is the communication facility that reduces the chances of carbon emission due to other devices like computers and laptops.... The paper "Applying Green IT Strategies and Applications to Wal-Mart" describes that Hyper Star went through the transformation procedure in a period of two years during which it faced a downfall in return on investment....
15 Pages (3750 words) Case Study

Research in Motion

These devices revolutionized mobile telecommunications in the world due to their touted initial addictive nature.... The entrance if these two brands into the telecommunications industry led to the emergence of new platforms and devices.... A key factor to RIM's success with their BlackBerry brand was the enhanced emailing capabilities that came with the mobile device.... This aspect combined with its long battery life and significant security features made the device a must have mobile devise for business executives, government personnel and other professionals....
5 Pages (1250 words) Case Study

The Implications of a Major Change Introduced by a Non-Grocery Retailer, Carphone Warehouse

The paper "The Implications of a Major Change Introduced by a Non-Grocery Retailer, Carphone Warehouse" is an evaluation report prepared on Carphone Warehouse, the non-grocery mobile phone retailer pertains to its recession-driven change in retail operations and its implications on the company's market performance.... The joint venture led to Carphone Warehouse's establishment of various Big Box electronic stores all over Europe, as well as dedicated Best Buy mobile stores named the Carphone Warehouse, in the U....
6 Pages (1500 words) Case Study

Competition between Giant Smartphone Companies

Furthermore, it was recorded that an estimated 300million mobile devices were sold towards the end of the year of 2011 which was closer to their competitor's nokia who sold slightly more that year.... Evidently, it is worth noting that the Samsung Company is a successful business venture that has recorded huge profits from the sale of mobile devices all over the world.... Moreover, the paper will also document the efficiency of the company and at the same time document the response of the apple company to the insurgence of the Samsung devices in the market....
13 Pages (3250 words) Case Study

Challenges Faced by BYOD

The landscape risks are categorized into risks relating to the app, management of the environment the mobile is used and securing the mobile devices.... The real challenge is for these organizations to establish a procedure to accommodate these devices, develop a support mechanism for their works, and one that would amicably comply with the security measures put in place.... efore the inception of BYOD, it was easier to manage and protect an organization's devices from the now very many risks....
6 Pages (1500 words) Case Study

Mobile TV: Has Its Time Come

hellip; mobile television is categorized by the nature of its delivery: to the mobile device such as the smartphone.... Content offers a personalized experience from traditional television as much of what is delivered via unicast or multicast transmission is customized for the mobile device and differs considerably from traditional broadcasting strategies.... It was determined that mobile television has reached it time-based on knowledge of inter-linkages between price discrimination and content accessibility and consumer lifestyle....
10 Pages (2500 words) Case Study

Observation of User Experience of Samsung Galaxy Phones

Samsung and Sybase work together for managing and securing android devices.... Samsung mobile can transfer data by using the Microsoft exchange server which keeps the user up-to-date with contacts, events, and so on.... “This partnership provides the comprehensive capabilities that it requires to allow mobile workers access to enterprise assets using the Samsung GALAXY S II.... Samsung Dual Core Application Processor is the ultra-responsive answer to mobile performance, providing high-speed multitasking, quick web page loading, quick reaction speeds, a smoother UI, lightning-fast image editing, and high-performance gaming....
13 Pages (3250 words) Case Study

Best Practice for Software Developers in Mobile Application Development - Security and Challenges

mobile devices have replaced Laptops and desktop computers.... Apple leads in various mobile devices like the iPod, iPhone, and iPad.... A number of mobile devices support Google's Android.... These include Samsung, HTC, LG, among other devices.... This research "Best Practice for Software Developers in mobile Application Development - Security and Challenges" focuses on the mobile application development cycle, challenges faced in implementation, security challenges, analysis, and maintainability aspects....
11 Pages (2750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us