Describe some of the risks associated with using mobile devices in an enterprise environment.

What will be an ideal response?

1.Users may erase the installed built-in limitations on their smartphone (called jailbreaking on Apple iOS devices or rooting on Android devices) to provide additional functionality. However, this also disables the built-in operating system security features on the phone. 2.Personal mobile devices are often shared among family members and friends, subjecting sensitive corporate data installed on a user's device to outsiders. 3.Different mobile devices have different hardware and different versions of operating systems, all of which contain different levels and types of security features. Technical support staff may be called upon to support hundreds of different mobile devices, creating a nightmare for establishing a security baseline. 4.Mobile devices may be connected to a user's personal desktop computer that is infected, thus infecting the mobile device and increasing the risk of the organization's network becoming infected when the mobile device connects to it. 5.There may be difficulties in securing the personal smartphone from an employee who was fired so that any corporate data on it can be erased.

Computer Science & Information Technology

You might also like to view...

In Access, there are several ________ methods to help minimize data entry errors into tables and forms

Fill in the blank(s) with correct word

Computer Science & Information Technology

Most intellectual property you create would be protected by ________

A) copyrights B) patents C) trademarks D) service marks

Computer Science & Information Technology