Mobile Incident Response Essay

Great Essays
FRAMEWORK FOR MOBILE APPLICATION INCIDENT RESPONSE
P2273379A

1. INTRODUCTION

Mobile technology has penetrated people’s daily lives. Mobile technology brings a lot of positive effects to human lives, ranging from education, research, entertainment, health sector, social media, shopping and banking. However, the development of mobile technology has also a negative effect. As an example, people can do mobile banking, checking balance, transferring money, purchasing online and the like. These are positive effects. But there are a lot of problems related to it like loss of money, unknown withdrawals, over debits and many other incidents.

These incidents can be brought about by bugs in applications, data security issues,
…show more content…
OBJECTIVES

The framework ensures the bank to make the appropriate decisions and quick actions and support the ability to exercise guidance over incident activities.

The objective of having a Mobile incident response framework includes:

Analyzing the incidents and events. The goal here is to identify the incident, the scope of the incident, document the extent of the damage it may cause, and provide effective response or action plan. Incidents will be properly handled through thorough analysis of the incident, collection of evidence, track the origins (if possible), and immediate response support for the affected unit or victim.

Managing Vulnerability. Need to gather data about the running IOS/Android operating system and vulnerabilities of the applications installed. The easiest way to do this is scan the device to determine and verify the suspected vulnerabilities and apply patches or updates to prevent the exploitation. Then notify others the need to know basis to prevent more damage.

Evidence. It can be defined as any object found that could be the threat involved in attack not only on the device itself but to prevent the spread to other devices as well. . There are viruses that spread like ‘HummingBad’ as a living
…show more content…
Timely updates should be incorporated in the procedures to be sure of the effectiveness of the solution. Reports of incidents, prevention and vaulting should be provided to evaluate the effectiveness of the solution in place and types of attacks being encountered.

b. Uniformity of software to be installed in end-user Smartphone based on what the equipment will be used for.

c. Antivirus solution must be part of the security setup and set to automatic scan/update.

d. Any files received either electronically sent or through removable media should be scanned for probable malicious software content. e. Electronic mail attachments and downloads should be checked for malicious software before use. The corporate email system should be protected against this and “SPAM”.

f. An incident response procedures and team should be established to deal with the outbreak of this malicious software.

g. User awareness and training should be periodically done to inform users of the risks associated with obtaining files and software either from non-trusted websites, or on any other medium, indicating what protective measures should be taken. Bulletins and other informational messages should be regularly released for this purpose.

h. Regular update of the operating system and applications should be done to avoid vulnerabilities to these malicious

Related Documents

  • Improved Essays

    I will pass policies that show employees how to construct strong passwords to log in to the system such as P0c0nt@s2132, in which shows not only letters but upper case, symbols, and numbers. As well as, a secret question and password must be provided to provide reassurance that the person logging in is who they say they are. Next would be to have the right and updated anti-virus and malware protections. This will help detect threats that enter the system. Locking your network and applying wired networks, which involves plugging into physical outlets or hacking modem ports.…

    • 700 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Before making an application live developer may also leave certain debug options running in order to re-examine. Special attention must be given to these backdoors as attacker can gain unprivileged access to the website [31]. Since these debug options facilitate back-end entry to the developers, and sometimes these debug options are left enabled unnoticed, this may provide an easy entry to a hacker into the web-site that let him make changes at the website level [31]. Now that we have seen some of the application level threats to the system we will look into what security measures can be used to avoid such attacks. Best way to achieve an application level security in a cloud environment is to analyze and address security threat at various cloud service model such as SaaS, PaaS and IaaS .For example in case of IaaS service model developers are given capability to develop and deploy application in a cloud environment.…

    • 745 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Gamblebet Fraud Case Study

    • 1717 Words
    • 7 Pages

    Any loopholes and vulnerabilities identified in risk analysis would be considered and take care of. Any weaknesses of software would be highlighted by us during the investigation. Set of recommendations Recommendations for GambleBet company to secure their sensitive information from the hackers are as follows:- Access controls describe what activities a user can do or what objects an operator is permitted to access. Access controls are constructed upon the substance of elements designed to ease the matching of an operator to a development. These elements are identification, authentication and authorisation which are also called as…

    • 1717 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Lastly, a security review is done, where the security measures are explained in terms of the end client’s stances and what and how the product is setup to withstand attacks in the future (Howard, 2005). The final phase is watching out for new vulnerabilities and implementing fixes patches and updates in a timely matter to alleviate future compromises. Also in this phase, reports are created of errors that have occurred and prevention of new errors from rising. The web server attack can cause harm to an organizations name and brand. The consequences can be website damage and destruction, compromised information, alteration of data (users ' personal data), and web server infringement.…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    M1 Unit 3 Risk Analysis

    • 1198 Words
    • 5 Pages

    Therefore, threat agents will try to use their attacks to reveal those assets to expose the sensitive information that they are looking for. If we don’t want this to happen to our business, we need some sort of defense such as a countermeasure to safely protect our assets. R9: Some typical information assets include personal computer systems and login information to those systems. Another would be banks accounts and the credentials for the accounts. Moreover, financial documents and the website that controls the…

    • 1198 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Wireless: Attempt to gain access to the wireless servers and workstation and also gain unauthorized access. Remote access: using generic password or user ID to gain unauthorized systems access. Users’ education in conjunction with scenario-based training is the best defense against Social Engineering attacks. Organization must implement an education program with invigorate network and physical security measures to protect its systems. Also with the use of scenario-based training users of the network can learn how to properly answer or respond to social engineering threats or attacks.…

    • 706 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Computer security should be the focus for every organization. Organizations can combat cyber terrorism by implementing a recovery process (Easttom, 2012). This recovery process will let an organization that undergoes a security issue recover data, and also recover the entire network if needed. If a security incident occurs because an employee or an outside attacker deletes key information, an organization can quickly recover those files (Easttom, 2012). Further, an organization needs to assess the information they have and decide which information is sensitive, or critical to business operations (Easttom, 2012).…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Malicious code designed to exploit such vulnerabilities are a threat to confidential information Consequently, it is essential that small businesses keep their software and applications up-to-date with the latest patches. Updates to everything from Microsoft Office applications to new operating systems should be routinely checked for and downloaded. These patches and updates can be found on the specific vendor's website and their installation is particularly critical after a new product is released. Educate…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Risk Analysis Assignment

    • 1273 Words
    • 6 Pages

    They typically take which sequence of steps? The steps involved in risk analysis are; (1) identifying any potential risks, (2) assessing the risks the risks that are found, and (3) controlling threats to an organization 's IT infrastructure in hopes of lowering or eliminating security threats. Two factor authentication is another method for attempting to block unauthorized access to a system, network, or general sensitive information. Two factor authentication requires "something you know"; a password or PIN, and "something you have"; a card, dongle, cellphone, or other piece of hardware. Finally, it is possible to reduce an attacker 's chances by keeping systems up to date with items such as security patches and system software and hardware…

    • 1273 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Introduction In order for you to plan for security. You must first conduct a full risk assessment. The whole point of security planning is to develop some security polices so that you can implement some controls that will help to prevent the risks to your systems from becoming a reality. This paper will discuss some cybersecurity strategies and other various frameworks. It will also analyze the change control process and identification needed for security for the specific business fields.…

    • 1045 Words
    • 4 Pages
    Superior Essays