Mobile Security Case Study

1126 Words3 Pages

Mobile security, also called wireless security, refers to the protection of laptops, tablets, and smartphones, other computing devices as well as the networks they connect to from vulnerabilities and threats which are related to wireless computing. Mobile security is a broad term that entails several issues such as protecting a mobile device from malware threat, reducing risks and also securing the mobile device and its data in the incidences of theft, accidental loss of the device or unauthorized access. In the recent past, securing mobile devices has continued to attract the interest of many people (Malik & M Chaturvedi, 2013). The reason for this is the increase in the number of devices that are in operation. Also, the uses to which these …show more content…

Also, using passwords, pattern screen locks as well as other advanced forms of authentication, including fingerprint readers, eye scanners and other means of biometric readers. Mobile security is related to mobile device management. Mobile device management (MDM) applies to protecting devices in the business environment from any loss or theft and at the same time protecting the data stored on the devices. Cloud security or cloud computing security is a developing sub-domain of network security, computer security or the broader information security (Martin, 2013). The concept can be used to refer to a wide range of policies, controls and technologies that are designed to protect applications, data and other infrastructure associated with cloud …show more content…

InfoSec policies include general program policy, issue-specific security policy (ISSP) and system-specific policies (SSSPs). Programs are specific entities in the information security domain that require management. Protection encompasses all risk management activities including control, risk assessment, protection mechanisms, tools, and technologies. Each mechanism is involved in managing specific controls in an information security plan. People provide an essential link in an information security program (Tao, Lin & Lu, 2015). Managers must recognize the role played by people. Project management must be present in every element of an information security program. It involves identifying and controlling the resources applied to a project. It also involves measuring progress and adjusting any necessary

Open Document