Mathematics 1300 Formulas PDF material Book
Data theft by disgruntled or unauthorized employees is always a weakness in an enterprise. When an employee is granted access to sensitive information, it is possible that data may be leaked, either deliberately or due to human error. Preventive measures are a must; including having all employees signed a confidentiality declaration and agreement. In some workplaces, such as call centers where staff have access to massive amounts of personal information, enterprises may need to institute a policy preventing staff from bringing belongings, including mobile phones, into the work environment.Viruses are also a shortcoming on some mobile devices. The first proof of concept worm, known as Caber, was reported to be able to infect phones and devices running the Symbian operating system back in 2004 19 . The worm propagated via Bluetooth technology and its solutions appeared later on affected operating systems. Enterprises should therefore consider developing a security policy to protect mobile phones. Install anti-virus software in mobile devices with updated virus definition signatures. Other necessary patch management policies should be implemented and updated regularly. Although the original aim of GSM was to design a secure communication channel compared to earlier analogue voice transmission, it was found that GSM traffic was not as secure as expected, and interception of GSM traffic is still possible20.
This was exposed when a group of researchers in the US uncovered and cracked the secret COMP128 algorithm that is used for authentication and encryption in GSM21. Therefore, enterprises should consider one of the later communication protocols (such as 3G, Wi-Fi, etc.) for mobile devices used in business applications. A stolen or lost mobile device with unprotected storage allows an attacker to access the data on it. If the device is infected with malware, it may lead to hidden use of premium services, or leaking sensitive information. Here are some general tips for maintaining the security of your mobile device.
Click for PDF
0 comments