Mobile Incident Response Essay

Great Essays
FRAMEWORK FOR MOBILE APPLICATION INCIDENT RESPONSE
P2273379A

1. INTRODUCTION

Mobile technology has penetrated people’s daily lives. Mobile technology brings a lot of positive effects to human lives, ranging from education, research, entertainment, health sector, social media, shopping and banking. However, the development of mobile technology has also a negative effect. As an example, people can do mobile banking, checking balance, transferring money, purchasing online and the like. These are positive effects. But there are a lot of problems related to it like loss of money, unknown withdrawals, over debits and many other incidents.

These incidents can be brought about by bugs in applications, data security issues,
…show more content…
OBJECTIVES

The framework ensures the bank to make the appropriate decisions and quick actions and support the ability to exercise guidance over incident activities.

The objective of having a Mobile incident response framework includes:

Analyzing the incidents and events. The goal here is to identify the incident, the scope of the incident, document the extent of the damage it may cause, and provide effective response or action plan. Incidents will be properly handled through thorough analysis of the incident, collection of evidence, track the origins (if possible), and immediate response support for the affected unit or victim.

Managing Vulnerability. Need to gather data about the running IOS/Android operating system and vulnerabilities of the applications installed. The easiest way to do this is scan the device to determine and verify the suspected vulnerabilities and apply patches or updates to prevent the exploitation. Then notify others the need to know basis to prevent more damage.

Evidence. It can be defined as any object found that could be the threat involved in attack not only on the device itself but to prevent the spread to other devices as well. . There are viruses that spread like ‘HummingBad’ as a living
…show more content…
Timely updates should be incorporated in the procedures to be sure of the effectiveness of the solution. Reports of incidents, prevention and vaulting should be provided to evaluate the effectiveness of the solution in place and types of attacks being encountered.

b. Uniformity of software to be installed in end-user Smartphone based on what the equipment will be used for.

c. Antivirus solution must be part of the security setup and set to automatic scan/update.

d. Any files received either electronically sent or through removable media should be scanned for probable malicious software content. e. Electronic mail attachments and downloads should be checked for malicious software before use. The corporate email system should be protected against this and “SPAM”.

f. An incident response procedures and team should be established to deal with the outbreak of this malicious software.

g. User awareness and training should be periodically done to inform users of the risks associated with obtaining files and software either from non-trusted websites, or on any other medium, indicating what protective measures should be taken. Bulletins and other informational messages should be regularly released for this purpose.

h. Regular update of the operating system and applications should be done to avoid vulnerabilities to these malicious

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    This antivirus program installed in our system it runs in background and protects your computer always. We have to update them and keep our computer protected and safe. Proper virus protection is the best way to avoid unwanted intrusion.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Threat Assessment of ‘Important Security Alert From Windows’ Pop-Ups: ‘Important Security Alert From Windows’ Pop-Ups has created havoc among computer users that does not allow them to usually work in the computer. Where this adware has found its own method to attack the targeted system and to make the infected computer almost useless. In order to trouble computer user, it performs several malicious activities to use the security gaps in the system and it leads to freeze the entire running programs of the computer. Firstly, this malware program affect the processing speed of the infected computer to stop the basic functions of the system so that the computer will respond very slowly when user give any instructions.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    Secure Email: Install Antivirus, Antispam, and Antiphishing scanning software on the network for both incoming and outgoing mail. Also, set up your devices to automatically reject directory harvest…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Some characteristics may be unanticipated or confusing emails, poor spelling or grammar, requests for personal information, requesting to click on links or verify a message doubtfully. 2. Enhance the security of computers In order to reinforce the company, BWB must establish appropriate security policies or a set of codified standards and implement tools such as antivirus, encryption and patching. Some special software can be install which are specifically designed for phishing such as Kaspersky Internet security, Phish Tank, SmartScreen filter and so on.…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    In an effort to protect Zoeller Company assets and intellectual property from theft, disclosure, and/or destruction, it is important to exercise caution when browsing the Internet or utilizing e-mail systems from any computer device (includes desktops, laptops, tablets, and phones – company owned or personal) that has access to the corporate network. Please adhere to the following “Best Practices” to reduce the risk of infecting your computer or device with viruses and/or malware.…

    • 73 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Safe4Search: Threat Summary Safe4Search is a nasty Chrome extension by SafeForSearch.net that is labeled as a potentially unwanted program (PUP) and adware. So you should definitely be very careful if it has been installed on your computer without your knowledge. According to its official website, it has popular viral video from around the internet. But, this extension is generally referred as dubious adware. That is promoted through other free downloads as a tool, where this is especially useful to online shoppers because Safe4Search is to surf the Internet to its users.…

    • 292 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Privacy Policy

    • 108 Words
    • 1 Pages

    Privacy Policy: We understand your privacy is very important and we have taken necessary measures to ensure the protection of your data and information. This privacy policy explains how we access, store and use the information that we have collected from you. The information that we have collected from you will be only used to keep the track record of your gaming activity to provide you better services.…

    • 108 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    As has been mentioned in the server section, unpatched computers are attacked quickly and infected in a matter of minutes when attached to the Internet. Security controls for threat 1 - C3J recommends turning on automatic updates and/or regularly downloading software patches to mitigate the risk of this threat. Threat 2 - Workstations have no antivirus protection to protect them from malware infection. Once again, installing antivirus…

    • 540 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The basic protection of data depends on update the anti-malware protection, firewall, and encryption. Creating some security awareness programs. All the people should maintain the data confidentiality and data integrity. In each organization…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    A. Risk Register Contoso Corporation is an international Information Technology (IT) training and consulting services provider headquartered in San Diego, CA. It also has offices in Toronto, Canada and Mexico City, Mexico. As a Microsoft Gold Partner, Contoso offers training courses for Microsoft products and services. To reduce its costs and expand its offering to a global audience, Contoso recently shifted its training focus from instructor-led classes at physical training centers to the virtual training model in the cloud. The virtual labs platform is hosted and managed by its cloud hosting provider in Chicago, IL.…

    • 943 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Toyota – Internal and External environment analysis. Internal business environment. The internal business environment is composed elements within the organization. It includes factors within that have an impact on the approach and success of your companies operations.…

    • 1423 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Mobile Security Essay

    • 1772 Words
    • 7 Pages

    Introduction The mobile platform has been at the forefront of innovation in the last 5 years. We now have access to our email, personal media, and people we care about within reach of our pockets. Smartphones have recently made our lives easier with its quick access to services we didn’t have before. Applications like GrubHub and Uber allow us to get food delivered that would not normally and find an easy and safe ride to any destination.…

    • 1772 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nowadays, technology develops better and better. Some people can 't even live without a mobile device for a day. Right now, people all use their phone to make the social communication, they use the phone to make a call, to text, to go to Facebook, Instagram and all the social media apps. Mobile phone become a part of peopl 's basic life. But if we don 't find a right way to use the phone, it will bring negative effect to our daily life.…

    • 774 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    M Commerce Case Study

    • 1038 Words
    • 5 Pages

    MOBILE COMMERCE (M-COMMERCE) AND MOBILE PAYMENTS Technology can be found anywhere and everywhere, we are living in a technological era and all we can do is to get is enjoy all the benefits that comes with it. One of the many benefits that comes from technology is the ability to buy, sell and pay almost anything from anywhere. The progress of technology all over the world is eminent but it does not mean everybody has easy access to it or access at all. Facilitating economic access and encouraging quick payments is a must to the order of the day. That is why a fairly new modality came into place, that is m-commerce and mobile payments.…

    • 1038 Words
    • 5 Pages
    Improved Essays