CIS 502 Case Study 3 Mobile
Devices Security
Case Study 3: Mobile Devices Security
The use of mobile devices is prevalent and growing rapidly as
users heavily depend on them. Unfortunately, attackers follow the money and
user population. In addition, mobile devices do not receive patches for their
vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is
an example defeating the emerging technology to steal userâs credentials and
ultimately money. Mobile devices can also spread malware.
Read the article titled, âMobile device attacks surgeâ and FIPS
140-2 Security Policy. In addition, read the report titled, âEmerging Cyber
Threats 2012â.
Write a five to eight (5-8) page paper in which you:
Describe the emerging cybersecurity issues and vulnerabilities
presented in the âEmerging Cyber Threats 2012â report. Analyze vulnerabilities
of mobile devices in regard to usability and scale based on your research and
suggest methods to mitigate the vulnerabilities of mobile devices. Assess and
describe the value of cryptography and encryption in regard to Equifaxâs
approach to implementing stronger security policies around mobile
devices. Justify Gunter Ollmannâs comments about Zeus-in-the-Mobile
(ZitMo) and describe the implications of advanced security breaches such as
this. Several challenges of controlling information online are set forth in the
section of the article titled, âControlling Information Online â A New Frontier
in Information Securityâ. Determine what you believe is the greatest challenge
in regard to controlling information online. Justify Dan Kuykendallâs statement
about the biggest issue with mobile browsers and give two (2) examples
illustrating his point. Use at least three (3) quality resources in this
assignment. Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12),
with one-inch margins on all sides; citations and references must follow APA or
school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the studentâs
name, the professorâs name, the course title, and the date. The cover page and
the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Analyze the methods of managing, controlling, and mitigating
security risks and vulnerabilities. Define common and emerging security issues
and management responsibilities. Explain access control methods and attacks.
Describe the applications and uses of cryptography and encryption. Use
technology and information resources to research issues in security management.
Write clearly and concisely about the theories of security management using
proper writing mechanics and technical style conventions