Mobile Computing and Networking


Technologies Associated with Mitigating Risk



Download 252,25 Kb.
bet12/22
Sana22.07.2021
Hajmi252,25 Kb.
#126088
1   ...   8   9   10   11   12   13   14   15   ...   22
Bog'liq
Term Paper edited

Technologies Associated with Mitigating Risk


After the decision has been made to incorporate mobile computing into an organization’s IT infrastructure, the new security risks related to this implementation must be properly addressed. The two primary technologies that are being used by the majority of companies as well as CPA firms to alleviate the risks associated with mobile computing includes automated wireless security management systems (WSMS) for larger organizations, and thin computing for smaller organizations. From an organizational standpoint, “the primary benefit of automated WSMSs and thin computing is the ability to consistently enforce security controls at the point of use (Aldhizer 60).” The implementation costs associated with these two technologies can vary greatly, with the implementation of an automated WSMS involving the purchase of expensive software, while thin computing is a much more cost-effective solution. There are a number of reasons as to why thin computing is considered to be such a cost-effective solution. These reasons include the fact that “thin mobile devices have little or no operating systems, they cannot store data, and the devices generally only have enough computing power to access the internal network where the applications and data needed by remote users are stored (Aldhizer 60).” Another benefit of thin computing is that all of the associated applications and data are stored on a central server controlled by the organization. Additionally, smaller organizations can benefit from the use of thin computing due to the fact that thin computing devices crash less frequently and linking them to internal networks is generally considered to be less complex. While thin computing is better suited to smaller organizations, larger organizations should consider implementing automated WSMS systems due to the fact that they can be customized to fit the unique needs of the organization.  The initial steps for the implementation of an automated WSMS system involve the organization conducting a feasibility study, which is immediately followed by management rallying key stakeholders in order to reach a consensus concerning the most sensitive data that needs to be protected. One of the primary benefits of an automated WSMS is that “if a user is in the process of violating the organization’s security policy, the WSMS can automatically shut down the procedure and send an alert to management for immediate investigation (Aldhizer 60).”


Download 252,25 Kb.

Do'stlaringiz bilan baham:
1   ...   8   9   10   11   12   13   14   15   ...   22




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish