Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

I need some assistance with these assignment. 1: mobile devices Thank you in advance for the help!

I need some assistance with these assignment. 1: mobile devices Thank you in advance for the help! CASE STUDY MOBILE DEVICES Case Study Mobile Devices Affiliation Table of Contents Risks Inherent In the Use of Wireless and Mobile Technologies3

Plan for Monitoring and Analysis4

Backups4

Services installed4

Firewall5

Strong Password5

Recommendation5

References6

Introduction

Wireless technology offers a number of advantages for the businesses as well as individuals. Without a doubt, it offers an excellent support for the businesses to generate revenue and improve business processes. Additionally, at the present, computers, other systems, devices, such as PDAs and smart phones can be connected wirelessly. However, a un-protected wireless connection can create a risk of hackers to access our impotent and private files and information, and it allows strangers to utilize our internet connection for completing negative tasks. In this scenario, this report will outline some of the major risks and issues regarding information and network security in the context of the doctor’s office.

Risks Inherent In the Use of Wireless and Mobile Technologies

We can face a wide variety of issues and problems while using wireless technology at the doctor’s clinic. Given below are some of the important issues: (Phifer, 2010. PrivateInternetAccess, 2012)

Data Interception: Security based attack at business network can cause theft of information and as a result damage corporate data.

Denial of Service: In such kind of attacks the company network is engaged in a constant working situation where no new user can connect and work due to heavy load of network processes.

Wireless Intruders: In this kind of security attack, wireless signals are captured and intruded for damaging the business working and hacking secret information.

Misbehaving Clients: Users who establish illegal and unauthorized wireless link of some kind, whether by chance or deliberately, place themselves and corporate data at risk.

Endpoint Attacks: This kind of security attacks are designed for network wireless endpoints. So, it can affect different users working at the clinic.

Mitigating Risks

This section discusses the procedures for the mitigation of above mentioned risks. There are some counter measures that can be adopted by the clinic to protect and defend the corporate network and operational setup:

Plan for Monitoring and Analysis

This section presents some of important initiatives that need to be taken by the clinic to better deal with security risks due to internal or external access:

Backups

We need to establish off-site storage space for taking backup of corporate data and information to ensure a high level of data security (Magalhaes, 2004).

Services installed

We need to install security and privacy services which are purposefully designed to restrict attacker who attempt to get access and incorporate some vulnerabilities inside our wireless network (Danchev, 2003).

Firewall

We need to install firewall for the protection of wireless network (Danchev, 2003)

Strong Password

We also need to ensure the implementation of strong passwords for effective security and privacy management at the doctor’s clinic (Danchev, 2003).

Recommendation

We need to take a number of actions in order to deal with security attacks at the doctors office. We need to implement a disaster recovery plan to deal with any internal or external security attack. In fact, the application of such security management mechanisms will offer an excellent support for fighting against any technology based disaster. We can also take following actions to ensure the security in a much better way: (ICO, 2012) (Lehembre, 2005)

Encryption of data

Altering the wireless network’s default name

Hide network ID

Selecting strong password

Do not auto-connect to wireless signals

References

Danchev, D. (2003). Building and Implementing a Successful Information Security Policy. Retrieved October 23, 2012, from WindowsSecurity.com: http://www.windowsecurity.com/pages/security-policy.pdf

ICO. (2012). Wi-Fi security. Retrieved October 23, 2012, from http://www.ico.gov.uk/for_the_public/topic_specific_guides/online/wifi_security.aspx

Lehembre, G. (2005). Wi-Fi security – WEP, WPA and WPA2. Retrieved October 23, 2012, from http://www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_EN.pdf

Magalhaes, R. M. (2004, July 23). Hardening Windows NT/2000/XP Information Systems. Retrieved October 19, 2012, from WindowsSecurity.com: http://www.windowsecurity.com/articles/Hardening_Windows_NT2000XP_Information_Systems.html

Phifer, L. (2010, March 08). Top Ten Wi-Fi Security Threats. Retrieved October 20, 2012, from http://www.esecurityplanet.com/views/article.php/3869221/Top-Ten-WiFi-Security-Threats.htm

PrivateInternetAccess. (2012). Public Wifi Security. Retrieved October 23, 2012, from https://www.privateinternetaccess.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question