blog




  • Essay / Vulnerability Assessments for Mobile Devices in the BYOD Environment

    Table of ContentsIntroductionDiscussionThere are security concerns in a BYOD environment that include the followingLack of security controlsUse of untrusted networks and mobile devicesUse of applications and untrustworthy contentDownloading and installing operating system updatesConclusionIntroductionMobile devices have become ingrained in our personal lives. Today, employees are allowed to use their personal devices in their work environment alongside company-issued devices. Organizations have integrated these devices into their systems. Organizations cannot physically stop the use of mobile devices for both work and individual motivation, but they must know how to control it. Mobile devices can lead to security vulnerabilities in a BYOD environment. Security vulnerabilities result from phishing and unauthorized access to user and organizational data (Disterer & Kleiner, 2013). Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”?Get the original essayDiscussionThere are security concerns in a BYOD environment that include the followingLack of security controlsMobile devices are built with capabilities of physical security such as PIN, pattern locks and biometric readers for user authentication. However, most consumers do not use these services, leaving their data exposed to third parties who may want to spy on them. Other users use PIN, but use codes that are easily predictable and easy to circumvent. Once lost, mobile devices can lead to other vulnerability issues because they can fall into the hands of people who can access data, including credit card numbers and other private data contained on the devices. Use of untrusted networks and mobile devices. Some mobile devices do not encrypt information such as this. in the form of emails during transmission. Counterfeit mobile devices do not meet established standards and therefore can be used for identity theft and have poor security. Wireless transmissions that are not encrypted result in data interceptions during transmission over the wireless network. When using untrusted networks, eavesdroppers easily gain access to sensitive data and information. Use of untrusted apps and content Untrusted apps can steal user information and will also not encrypt the data they receive and transmit over the network. Applications that do not use https cause data to be intercepted during transmission. Some websites contain malware that automatically downloads onto users' devices without their knowledge. Access to untrusted content may also result in surveillance. Without security software, malware is downloaded to devices and can be used for information phishing. Malware also affects the functionality of mobile devices because it uses resources that would otherwise have been used by other applications on the device (Cooney, 2015). These vulnerability issues caused in the BOYD environment must be addressed to ensure cybersecurity. There are different ways to implement political controls so that.