Online Learning
CLICK HERE TO ORDER YOUR ASSIGNMENT

1 Mobile Devices

CASE STUDY MOBILE DEVICES Case Study Mobile Devices Affiliation Table of Contents Risks Inherent In the Use of Wireless and Mobile Technologies 3
Plan for Monitoring and Analysis 4
Backups 4
Services installed 4
Firewall 5
Strong Password 5
Recommendation 5
References 6
Introduction
Wireless technology offers a number of advantages for the businesses as well as individuals. Without a doubt, it offers an excellent support for the businesses to generate revenue and improve business processes. Additionally, at the present, computers, other systems, devices, such as PDAs and smart phones can be connected wirelessly. However, a un-protected wireless connection can create a risk of hackers to access our impotent and private files and information, and it allows strangers to utilize our internet connection for completing negative tasks. In this scenario, this report will outline some of the major risks and issues regarding information and network security in the context of the doctor’s office.
Risks Inherent In the Use of Wireless and Mobile Technologies
We can face a wide variety of issues and problems while using wireless technology at the doctor’s clinic. Given below are some of the important issues: (Phifer, 2010. PrivateInternetAccess, 2012)
Data Interception: Security based attack at business network can cause theft of information and as a result damage corporate data.
Denial of Service: In such kind of attacks the company network is engaged in a constant working situation where no new user can connect and work due to heavy load of network processes.
Wireless Intruders: In this kind of security attack, wireless signals are captured and intruded for damaging the business working and hacking secret information.
Misbehaving Clients: Users who establish illegal and unauthorized wireless link of some kind, whether by chance or deliberately, place themselves and corporate data at risk.
Endpoint Attacks: This kind of security attacks are designed for network wireless endpoints. So, it can affect different users working at the clinic.
Mitigating Risks
This section discusses the procedures for the mitigation of above mentioned risks. There are some counter measures that can be adopted by the clinic to protect and defend the corporate network and operational setup:
Plan for Monitoring and Analysis
This section presents some of important initiatives that need to be taken by the clinic to better deal with security risks due to internal or external access:
Backups
We need to establish off-site storage space for taking backup of corporate data and information to ensure a high level of data security (Magalhaes, 2004).
Services installed
We need to install security and privacy services which are purposefully designed to restrict attacker who attempt to get access and incorporate some vulnerabilities inside our wireless network (Danchev, 2003).
Firewall
We need to install firewall for the protection of wireless network (Danchev, 2003)
Strong Password
We also need to ensure the implementation of strong passwords for effective security and privacy management at the doctor’s clinic (Danchev, 2003).
Recommendation
We need to take a number of actions in order to deal with security attacks at the doctors office. We need to implement a disaster recovery plan to deal with any internal or external security attack. In fact, the application of such security management mechanisms will offer an excellent support for fighting against any technology based disaster. We can also take following actions to ensure the security in a much better way: (ICO, 2012) (Lehembre, 2005)
Encryption of data
Altering the wireless network’s default name
Hide network ID
Selecting strong password
Do not auto-connect to wireless signals
References
Danchev, D. (2003). Building and Implementing a Successful Information Security Policy. Retrieved October 23, 2012, from WindowsSecurity.com: http://www.windowsecurity.com/pages/security-policy.pdf
ICO. (2012). Wi-Fi security. Retrieved October 23, 2012, from http://www.ico.gov.uk/for_the_public/topic_specific_guides/online/wifi_security.aspx
Lehembre, G. (2005). Wi-Fi security – WEP, WPA and WPA2. Retrieved October 23, 2012, from http://www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_EN.pdf
Magalhaes, R. M. (2004, July 23). Hardening Windows NT/2000/XP Information Systems. Retrieved October 19, 2012, from WindowsSecurity.com: http://www.windowsecurity.com/articles/Hardening_Windows_NT2000XP_Information_Systems.html
Phifer, L. (2010, March 08). Top Ten Wi-Fi Security Threats. Retrieved October 20, 2012, from http://www.esecurityplanet.com/views/article.php/3869221/Top-Ten-WiFi-Security-Threats.htm
PrivateInternetAccess. (2012). Public Wifi Security. Retrieved October 23, 2012, from https://www.privateinternetaccess.com/pages/public-wifi-security/

1 Mobile Devices