top threats to mobile computing

Upload: ahmadreza-khosravi

Post on 03-Jun-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 Top Threats to Mobile Computing

    1/18

    TOP THREATS TO MOBILECOMPUTINGTEAM 1: YUYAO HAN, FARHIN HASAN, XING JIN, AHMADREZA KHOSRAVI, CHIRAG PATEL, H

    XU, CHEN YANG

  • 8/12/2019 Top Threats to Mobile Computing

    2/18

    BYODbring your own

    Mobile Expense Management?

    Remote Email Access?

    Mobile Enabled Business Appl

  • 8/12/2019 Top Threats to Mobile Computing

    3/18

    BYODbring your own

    Mobile Expense Management?

    Remote Email Access?Mobile Enabled Business Ap

    This simply makes you an enterprise that uses mobile

  • 8/12/2019 Top Threats to Mobile Computing

    4/18

    A MOBILE ENTERPRISE:

    Has enabled flexible and scalable enterprise-wide mobility for employees and customers usiintegrated approach.

    Takes an integrated approach that aligns mobility initiatives with each other and with businesgoals and objectives, these organizations are able to provide instant access to business-criti

    applications for a variety of devices, while still maintaining high levels of security.

    May utilize cloud technology as an element in their approach to provide the scalable, on-deminfrastructure that makes true mobility possible across the entire mobile IT stack.

    Uses business analytics that draw data from both traditional sources and social business inteincluding analytics from mobile transactions and contextual data,allowing them to fine tune e

    from relevant employee applications to customer service and marketing initiatives.

  • 8/12/2019 Top Threats to Mobile Computing

    5/18

    WHAT IS MOBILE COMPUTING?

    ~ a versatile and potentially

    strategic technology that

    improves information quality and

    accessibility, increases

    operational efficiency, and

    enhances management

    effectiveness.

  • 8/12/2019 Top Threats to Mobile Computing

    6/18

    MOBILE COMPUTING SERVICE PROVID

    IBM MOBILEFIRST PLATFORM

    IBM MobileFirst Strategy and Design Services -Exploration, assessment and planning of your

    mobile enterprise to address current and future

    business and technology requirements that are

    unique to your organization, your industry and your

    users.

    IBM MobileFirst Development and IntegrationServices - Services to help you develop, deploy,

    integrate and manage application and infrastructure

    elements of the mobile enterprise while making the

    most of your existing investments.

    VERIVO AKULA

  • 8/12/2019 Top Threats to Mobile Computing

    7/18

    WHY ARE COMPANIES BECOMING MOB

    ADVANTAGES

    Marketplace instant and connected

    Meets employee demands and increasesproductivity

    Increases sales and enhances customer service

    Improves operational efficiencies, reduces costsmore scalable mobile architecture

    Differentiates and transforms customerexperience

    Enables faster implementation of new servicesand business models such as online product

    delivery and employee telecommuting by

    decreasing development and test times

    CHALLENGES

    Increased need for collabortherefore need for cyber sec

    Security, security, security

    The need for business and strategy change

    Mobile complexity and integ

    The mobile skills gap.

  • 8/12/2019 Top Threats to Mobile Computing

    8/18

    A DEEPER LOOK INTO CHALLENGESSecurity Change in Strategy Complexity and

    Integration

    Mobile Skill Gap

    Mobile security

    includes identity andaccess management,

    network security,protections for

    confidential data, and

    protection against

    viruses and malware.

    Identity and

    device/network

    access

    managementincluding endpoint

    control - presents the

    most immediate

    security challenge.

    The integrated nature

    of the mobileenterprise requires a

    correspondingintegration of

    platforms, processes

    and organizational

    decision making.

    This includes

    everything from

    ready-for-mobile

    applicationdevelopment and

    delivery to business-

    to-employee (B2E)

    and business-to-

    customer (B2C)

    communications

    processes

    cross-functional

    integration

    IT mobility stack

    Application store

    An average of

    percent of bushave all the sk

    needed to impland maintain ro

    and integrated

    mobility.

    Some of this s

    gap may be fill

    increased mob

    staffing investm

    IT professionadeep mobility s

    can be difficult

    Implementing a

    maintaining a m

    enterprise with

    help of a third p

    partner may be

    better solution

    many organiza

  • 8/12/2019 Top Threats to Mobile Computing

    9/18

    THE EVIL 8

    Data lossfrom lost, stolen or decommissioned devices.

    Information-stealing mobile malware

    Data loss and data leakage through poorly written third-party applications.

    Vulnerabilities within devices, operating system, design and third-party ap

    Unsecured WiFi, networkaccess and rogue access points. Unsecured or rogue marketplaces.

    Insufficient management tools, capabilities and access to application proginterfaces.

    Near-field communications and proximity-based hacking.

    http://www.bankinfosecurity.com/data-loss-c-208http://www.bankinfosecurity.com/anti-malware-c-309http://www.bankinfosecurity.com/network-perimeter-c-213http://www.bankinfosecurity.com/network-perimeter-c-213http://www.bankinfosecurity.com/anti-malware-c-309http://www.bankinfosecurity.com/data-loss-c-208
  • 8/12/2019 Top Threats to Mobile Computing

    10/18

    TOP 3 SECURITY THREATS TO MOBILECOMPUTINGDATA LOSSFROM LOST, STOLEN ORDECOMMISSIONED DEVICES

    Description: Effect/Downtime:

    Backup Option/Bootime:Identity management - using single

    sign-on - allows the organization to assign access

    limitations via a user name and password combination

    based on an employees title or line of business and to

    track the applications and data accessed by an individual

    across the enterprise.

    Network access control and policy management -

    integrated with endpoint control toolscheck the employee

    devices to be sure they are compliant with corporatesecurity standards. If a smartphone has had its security

    policies changed by its user or is not utilizing an acceptable

    level of virus and malware protection, endpoint control

    protocols can automatically deny access or quarantine the

    device. Endpoint control can then initiate an automated

    correction process to bring the device back in l ine with

    corporate standards.

    INFORMATION-STEALING MOBILE MALWARE

    Description:

    Effect/Downtime:

    Backup Option/Bootime: IT mobility stack - The

    endpoint control layer is where all the other layers

    meet. When the endpoint control layer serves as the

    automated integration point for the network and

    communication layer, the applications and

    provisioning layer and the security and certificate

    management layer, the complexities of user accessand security can be simplified and managed more

    efficiently and effectively. Within the network and

    communication layer, the mobile enterprise can

    leverage the heightened scalability that is required to

    manage large volumes of voice, video and application

    information.

    DATA LOSS AND DATA LEAKAGE

    POORLY WRITTEN THIRD-PARTAPPLICATIONS.

    Description:

    Effect/Downtime:

    Backup Option/Bootime:

    Application store - When the applicatio

    using to access corporate information i

    unapproved, the employee may experi

    failure and the organization can face he

    risks. The mobile enterprise allows for t

    contained application store. Two app screated: one where customers can dow

    and one where employees can downlo

    applications or remote desktop images

    corporate preferences. The contained a

    provides built-in application security fro

    access format that employees and cus

    familiar with.

    http://www.bankinfosecurity.com/data-loss-c-208http://www.bankinfosecurity.com/anti-malware-c-309http://www.bankinfosecurity.com/anti-malware-c-309http://www.bankinfosecurity.com/data-loss-c-208
  • 8/12/2019 Top Threats to Mobile Computing

    11/18

    RECENT SECURITY BREACHES

    Target

    http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0

    http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568

    http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/

    http://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.story

    http://www.cio.com/article/749841/4_Lessons_CIOs_Can_Learn_From_the_Target_Breach?taxonomyId=

    3089

    Neiman Marcus

    http://www.bloomberg.com/news/2014-12/neiman-marcus-sued-over-custome

    data-breach.html

    http://www.businessweek.com/articles/21/neiman-marcus-hackers-set-off-60-0

    while-bagging-credit-card-data

    http://www.bloomberg.com/news/2014-21/neiman-marcus-hackers-set-off-60-0

    bagging-card-data.html

    http://www.calculator.co.uk/2014/01/ovcredit-card-accounts-stolen-in-neiman-

    security-breach/

    http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0
  • 8/12/2019 Top Threats to Mobile Computing

    12/18

    MOBILE COMPUTING SECURITY OPTIO

    CHALLENGES/

    LIMITABIL

    INTEROPERABILI

    BETWEEN SECUR

    SOFTWARE

  • 8/12/2019 Top Threats to Mobile Computing

    13/18

    SECURITY SOFTWARE SUBSCRIPTION

  • 8/12/2019 Top Threats to Mobile Computing

    14/18

    COST/BENEFIT REVIEW

  • 8/12/2019 Top Threats to Mobile Computing

    15/18

    HOW DIFFICULT IS IT TO SWITCH BETWSECURITY PROVIDERS?

  • 8/12/2019 Top Threats to Mobile Computing

    16/18

    CHECKLIST WHEN TRANSFORMING INMOBILE ENTERPRISE:

    Detailed strategy development

    Security and certificate management

    Endpoint control

    Network infrastructure, access and control

    Applications and provisioning

    Unified communications

    Back-end integration

    Skills: in-house versus third party

  • 8/12/2019 Top Threats to Mobile Computing

    17/18

    REFERNCES

    https://zmail.utdallas.edu/service/home/~/Mobile%20Enterprisuth=co&loc=en_US&id=9182&part=2

    http://www.idi.ntnu.no/grupper/su/mowahs/links/MobileFramew

    http://www.ocio.usda.gov/about-ocio/enterprise-applications-seas/eas-mobile-computing-program-management-office

    https://zmail.utdallas.edu/service/home/~/Mobile%20Enterprise.pdf?auth=co&loc=en_US&id=9182&part=2https://zmail.utdallas.edu/service/home/~/Mobile%20Enterprise.pdf?auth=co&loc=en_US&id=9182&part=2http://www.idi.ntnu.no/grupper/su/mowahs/links/MobileFramework.pdfhttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.idi.ntnu.no/grupper/su/mowahs/links/MobileFramework.pdfhttp://www.idi.ntnu.no/grupper/su/mowahs/links/MobileFramework.pdfhttps://zmail.utdallas.edu/service/home/~/Mobile%20Enterprise.pdf?auth=co&loc=en_US&id=9182&part=2https://zmail.utdallas.edu/service/home/~/Mobile%20Enterprise.pdf?auth=co&loc=en_US&id=9182&part=2https://zmail.utdallas.edu/service/home/~/Mobile%20Enterprise.pdf?auth=co&loc=en_US&id=9182&part=2
  • 8/12/2019 Top Threats to Mobile Computing

    18/18

    The End