Verified Document

Portable Mobile Devices I.E. Smart Research Paper

It is at this point that hackers can be able to penetrate these vulnerabilities to use them as a backdoor inside a company's database. Once this occurs, is when there is the possibility that the situation will become worse as more criminals will utilize this as an easy way to overcome the challenges of going directly after a firm's initial blocks. This is important, because it is showing how there are increased vulnerabilities that these phones have due to the lack of effective security. (Coleman, 2011) To make matters worse, many firms have begun using cloud computing as way to store large amounts of information. This is when they have significant pieces data on an organization's mainframe. The reason why, is because these kinds of computers have become more powerful and cheaper. This is allowing a variety of firms to be able to reduce costs and increase the total amounts of storage that they have available. The problem is that this kind of security procedure is giving hackers the ability to overcome traditional defenses. Part of the reason for this, is because a number of security experts have been advising their clients about how their current strategy can deal with any kind of threats they are facing. Once this occurs, is when it can lull most IT personnel into a sense of complacency about the overall nature of the threats. This is the point that odds increase that hackers will be able to break into mainframe computers that are storing large amounts of information. (Kark, 2011) (Tanzy, 2011)

A good example of this can be seen with the recent announcement that the security firm Stratfor (as they were the victim of this kind of attack.) What happened was a group of hackers identifying themselves as Anonymous had broken into the firm's mainframe and they were able to gain access to thousands of credit cards along with other pieces of personal information. Some of Stratfor largest clients include: the U.S. Air Force, Apple, and the Miami Police Department just to name few. Instead of using this information for illicit purposes, the hackers were politically motivated by calling for the release of Specialist Bradley Manning. He is accused of giving the web site Wiki Leaks tens of thousands of classified U.S. government cables. What the group has been doing is making donations to charity with the stolen information that was obtained. This is problematic, because it is showing the increasing vulnerability that a number of organizations are facing. The reason why, is because most firms are relying on IT security experts and consultants to reduce their risks. During this process is when they will have them store large amounts of data on their mainframe through cloud computing. However, the fact hackers are able to gain access by directly going after portable mobile devices is an indication that they can use this as a way to circumvent various security procedures. Once this takes place, is when they can be able to gain access to large amounts of information undetected. This is significant, because it is showing how there are increasing vulnerabilities that most firms are facing. ("Anonymous Hackers Target U.S. Security Think Tank," 2011)

As a result, IT security personnel must be able to understand the overall nature of the threat and how to effectively counteract what is happening. Otherwise the odds increase that there will be more of these kinds of incidents taking place. This is when there is the possibility that large amounts of information stored on various databases could increase the overall vulnerabilities of an organization to hackers. Once this takes place is when the odds improve, that there will be larger amounts of security breaches that are being reported. This is the point that it will be difficult to protect and store sensitive information that are vital to the success of an organization in achieving its objectives. Therefore, it is essential for IT personnel to create a strategy that will take the changing nature of the threat into account and how it should be effectively counterbalanced.

Specific Tools that can be used to enhance a Firm's ability to protect themselves

To deal with any kind of possible threats to the database in the future all organizations must be able to use a number of different tools in achieving these objectives. The best way that this can be accomplished is through having an approach that will specifically address the overall nature of the threat. This means that all organizations must implement an approach that is based upon flexibility and utilizing techniques that will deal with these...

To do this there must be an all-encompassing strategy that will concentrate on a number of specific tactics. The most notable include: storing information is absolutely necessary, protecting database that is accessed over public networks, configuring devices to block external spying, encrypting sensitive information, utilizing mandatory access control, conducting audits and backing up critical data. These elements are important, because the combination of them can allow an organization to adapt with the various threats that they are facing. Once this occurs, is when they will reduce the chances of allowing hackers to use this as a backdoor to receive key pieces of information. (Olzak, 2008)
Storing what is Necessary

This is when a firm is limiting the total amounts of data that is stored on smart phones and tablets. What has been happening is the lack of control of this information has allowed employees to download critical pieces of data that are sensitive such as: spreadsheets, customer files and various pieces of financial information. When a hacker is able to gain access to these devices they will automatically be able to retrieve files that are considered to be classified in nature. Moreover, this information could provide them with the ability to easily access larger amounts of an organization's files. This is because the data that is stored on these devices will often have user names and passwords for entering their database. Criminals can use this as way to make themselves appear to be the employee accessing these files. Once this occurs, is when IT personnel will not be able to identify any kind of unusual activity. This is the point that hackers can anonymously be able to retrieved large amounts of information despite the various external security blocks that are in place. (Olzak, 2008)

Protecting Data that is accessed from Public Networks

One of the most common methods that hackers are using to gain access to various devices is through public networks. This is because various WIFI connections do not have the same kind of security protocol as large organizations. At the same time, any kind of encrypted data that is received will not be secured. The reason why, is because most of these sites do not have any kind of SSL certificates or firewalls in place. This is problematic, because it can allow criminals to have access to information without the other party knowing what is happening. Once this takes place, is when the odds increase that there will be a number of challenges associated with maintaining control of various pieces of data. This is when hackers can use this to gain access to wide variety of areas inside the organization's database. To prevent this from happening, it is advisable that all firms require anyone who is accessing their database to use websites that have an SSL certificate. This will reduce the ability of criminals to monitor what kinds of activities are occurring. (Olzak, 2008)

Configuring Devices to Block External Spying

When we are configuring a device to prevent external spying is the point that a firm will require everyone to establish some kind of firewall. This is because most people will assume that the security provisions from the internal operating system will protect them against possible breaches. However, the problem is that most hackers have figured out how to overcome these defenses. As a result, firms must require employees to install and update a secondary firewall from one of the well-known security providers (i.e. McAfee, AVG or Symantec). This will prevent hackers from being able to access critical prices of data. As these kinds of firewalls are serving as secondary barrier that will make it difficult for them to overcome the security provisions. Once this takes place, it means that criminals will have to try numerous tactics in overcoming these barriers. This is the point that they will move on to other targets with greater vulnerabilities. (Olzak, 2008)

Encrypting Sensitive Information

Another avenue that must be taken is all organizations need to be encrypting sensitive information. This is accomplished by requiring employees to access sites from URL addresses that have SSL certificates. At the same time, the individual must not be allowed to store any kind of end data that they are receiving. If this kind of approach can be taken, it will ensure that an organization will not have some kind of security breach when an employee is accessing sensitive information when they are on…

Sources used in this document:
References

Anonymous Hackers Target U.S. Security Think Tank. (2011). Newsday. Retrieved from: http://www.newsday.com/business/technology/anonymous-hackers-target-us-security-think-tank-1.3411610

Department of Defense Strategy for Operating in Cyber Space. (2011). U.S. Department of Defense. Retrieved from: http://www.defense.gov/news/d20110714cyber.pdf

Targeted Cyber Attacks Rise. (2011). Fox News. Retrieved from: http://www.foxnews.com/scitech/2011/04/05/targeted-cyber-attacks-rise-2011-security-experts-say/

Coleman, K. (2011). Digital Conflict. Defense Systems. Retrieved from: http://defensesystems.com/blogs/cyber-report/2011/09/cyberattacks-on-mobile-devices.aspx
Kark, K. (2011). Foresters 2011 Security Strategy. CS Online. Retrieved from: http://www.csoonline.com/article/657814/forrester-s-2011-security-strategy-recommendations
Olzak, T. (2008). Five Steps to Protect Mobile Devices. Fed Tech Magazine. Retrieved from: http://www.fedtechmagazine.com/article/2011/08/mobile-and-cloud-killer-combination
Tanzy, B. (2011). Security Strategy. Silicon.com. Retrieved from: http://www.silicon.com/technology/security/2011/05/12/security-strategy-staff-smartphones-ring-the-changes-39747388/
Cite this Document:
Copy Bibliography Citation

Related Documents

Mobile Devices in Hospitals to
Words: 3494 Length: 14 Document Type: Term Paper

Both of these devices "allow handwritten data entry including sketching with 'electronic ink' and handwriting recognition that converts scribble into typewritten text." (Wales and Zabrek, 2003) Full integration with hospital servers of these devices is required to realize the full benefits of these devices. These mobile devices "facilitate the entry of data for storage and processing at the servers. By storing hospital data on servers rather than on the mobile

Mobile Technology the Ever-Increasing Number of Smart
Words: 2611 Length: 8 Document Type: Essay

Mobile Technology The ever-increasing number of smart devices and the mobilization of technology in general has precipitated a number of importance changes in the way people conduct their private and public lives. By examining some importance developments in the area of healthcare, commerce, and politics, this essay argues that mobile devices have already fundamentally altered the human experience of the world, and will continue to do so at an exponential rate.

Market Plan Mobile Phone
Words: 4408 Length: 11 Document Type: Research Paper

Goldenline Market Plan Golden Line will prove to the business community that it is the most prestigious technology firm in the industry. With an increase in technological advancement, Golden Line will pave the way for the future in the electronics industry. Golden Line intends to dominate the mobile phone industry by launching unbelievable items. The company's smart phones will be incomparable to competition with Motorola and Samsung. The new products will

How Smart Do We Want Smartphones Do We Really Need Them
Words: 1974 Length: 6 Document Type: Essay

Smartphones: Do we really need them? How smart do we want smartphones? Do we really need them? In basic terms, a smartphone can be defined as a cellular telephone with advanced features and capabilities. In addition to being enabled to access the internet, a smartphone sports numerous built-in applications. Some of the features of modern smartphones include, but they are not limited to, video and still cameras, e-mail messaging, MP4 and MP4

Cross Platform Mobile and Web
Words: 17284 Length: 63 Document Type: Thesis

82). Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actual content of the widget, namely text, linked images/video or content pulled from a server of Web service. Alternatively, the widget content can be created using Flash, although

Tablet Devices Replace the Latop
Words: 16026 Length: 55 Document Type: Dissertation

It initially failed to attract the desired audience, but it is believed that the recent innovations of the re-launched tablet PC would ensure its success (Search Mobile Computing, 2010). While Apple stated that they were the first creators of tablet computers, Microsoft comes to argue the same. Thorn Holwerda (2010) however states that neither of the two it monoliths were the creator of tablet PC. "Well, no. They're both wrong.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now