Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

I have to review this article with references in APA format.

Losing data is never good. So to combat this we must protect the mobile devices (tablets) that our employees use. Phifer (2011) gives a good starting point to protecting tablets.

Beginning with the policies we use for smart phones we need to ensure tablets have device lock enabled to reduce risk of misuse. As for anti-theft measures, remote lock and remote wipe needs to be enabled as well as location services to give a general ping of the tablet's location in case retrieval is possible.

Encryption of data being sent and received must also be achieved by using email with SSL/TLS, Wi-Fi with WPA2 and VPNs when interfacing with the corporate network.

Data stored on the tablet should also be encrypted and this can be accomplished through self-protecting apps. Anti-malware apps should also be sued to add to the protection provided by firewalls and IDSs (Phifer, 2011). Vacca (2014) also backs this up with a list of controls that outline the basics for protecting tablets. "

1. Establish a customized corporate usage policy for mobile devices

2. Establish a policy for reporting theft or misplacement

3. Establish a well-tested SSL VPN for remote access

4. Establish inbound and outbound malware scanning

5. Establish WPA2 encryption for Wi-Fi traffic access" (p. 233) A tool to help in managing multiple tablets without having to configure each one manually, one at a time, is Mobile Device Management (MDM) software.

This allows a central point of rule and policy making and management to apply to multiple devices at once.

An example of this is Zenprise MobileManager that "provides centralized visibility to the devices and users that are connecting to the corporate network and allows IT to manage the devices by applying the right set of policies to ensure compliance" (http://www.ndm.net/mobile/Zenprise/mdm).

As we harden our security and build defenses and test and rebuild them as needed, I'm reminded of what is said in Matthew, "And I tell you, you are Peter, and on this rock I will build my church, and the gates of hell shall not prevail against it" (16:18, ESV). And although we are building a network defense and not a church I'm a firm believer that if we stay vigilant and continue to check and make better, our security will make it all the harder for an attacker to breach our defenses. Phifer, L. (2011, February). Tablet security: Best practices for the tablet computer onslaught.

Retrieved August 23, 2017, from http://searchmobilecomputing.techtarget.com/tip/Tablet-security-Best-practices-for-the-tablet-computer-onslaught Vacca, J. R. (2014). Network and System Security. Elsevier, Inc.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92421853
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Research web server vulnerabilities by choosing a site and

Research web server vulnerabilities by choosing a site and determining what kind of platform it is running on. Do not scan the server, you can use a site such as Netcraft to determine what the website is running. See if ...

Suppose a finite deck of numeric cards 1 2 3 have been

Suppose a finite deck of numeric cards 1, 2, 3, ... have been shuffled randomly. Repeat the following step: If the top card is numbered 1, the game terminates. But if it is any number n > 1, then reverse the ordering of ...

Assignmentbullselect two systems in the lab or at home on

Assignment • Select two systems in the lab (or at home on the same LAN) make sure that they you are able to pass messages between them • Establish Wireshark on one of the systems and be sure that you can see all the mess ...

We can represent numbers in different bases think of how

We can represent numbers in different bases. Think of how you could represent the number 5 in base 2. Essentially, how can you break the number 5 into powers of 2. It contains one 4 and one 1. In base 2, your digit overf ...

Remember all of the following steps when showing that a

Remember all of the following steps when showing that a problem D is NPcomplete: 1. Show that D is in NP by briefly explaining how to quickly verify a solution to it. 2. Choose another problem Q that is known to be NP-ha ...

What are impacts that flexible work schedules can have on a

What are impacts that flexible work schedules can have on a employee's productivity?

Assignment from chapter 10 page 302 web-based case read and

Assignment: From Chapter 10, page 302, Web-Based Case. Read and answer the questions. KNOWLEDGE MANAGEMENT SYSTEMS AND CRM In answer to the challenges Nelnet faces in servicing a growing volume of student loans, the comp ...

Assignmentnbspon information systems audit and

Assignment  on Information Systems audit and controls Assignment purpose: Elaborate on the different types of control that are applied in a hospital (Preventive, detective and corrective control). Evaluate the logical an ...

It has been a bad day for the stock market and you have

It has been a bad day for the stock market and you have heard that only 30% of all stocks gained value. Suppose you have a portfolio of 10 securities and assume a binomial distribution for the number of your stocks that ...

Question capstone project - informationalthis part of the

Question: Capstone Project - Informational This part of the assignment is NOT FOR GRADING this week. This part of the assignment is to contribute to the capstone project and also to show the instructor that progress is b ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As