Автор Тема: We can't do it' and more a question of 'how do we do it'.  (Прочитано 295 раз)

zisetinglan

  • Постоялец
  • ***
  • Сообщений: 137
    • Просмотр профиля
 Mobile devices Brooks Reed Jersey , including touch screen phones and pc tablet puters, enable custors to aess business data from any ple. In 2013, individuals will purchase 1.2 billion cellular phones, surpassing pcs as the most mon ans for aessing this site the . Security and safety http:phone-op.tesco. of these mobile phones is a major concern for organizations, however. The o leading mobile operating-system (OS), Google's Hudl Aessories OS and Apple's iOS, both have security and safety concerns as do the mobile phone applicationsand the major application markets. 'Bring your own devices,' where staff supply their own equipnt for work-related purposes, can cut costs for organizations Kareem Jackson Texans Jersey , but failing to address security and safety can significantly increase those costs. This paper focuses on the increasing need for mobile business and its related mobile device security and safety concerns. We propose that future IT industry experts ould be aware of these issues and learn how to secure cellular phones through the integration of the topic into the IT Model Curriculum. Using the case of one undergraduate IT program, welaunched aset of phone security and safety education rendations, which we then mapped to the IT Model Curriculum using the guidelines from Areditation Board for Engineering and Technology (ABET). This mapping approh demonstrates one way how higher education institutions could integrate cell phone security and safety into any IT curriculum.Keywords : Mobile puting, Information assurance and security (IAS), ABET, Model curricula, Curriculum design and developntFull Text:1. INTRODUCTIONAs of January 2013 in arica, Hudl Aessories made up 52.69 percent of cell phone operating-systemand Apple iOS aounted for 34.9 percent (Statcounter, 2013). Apple iOS had the lead only eighteen months earlier. Since the sumr of 2011 Kareem Jackson Womens Jersey , Hudl Aessories has steadily taken over the market from iOS as the most popular mobile main systemwith all other platforms, like Windows Mobile, Symbian, and BlkBerry, aounting for less than thirteen percent bined (Statcounter, 2013).Cellular phones include smartphones and tablets, both of which have bee very popular among consurs. In 2013, people will purchase 1.2 billion smart phones, surpassing PC's as the most mon thod for aessing the Inter (Lookout Kareem Jackson Elite Jersey , 2013). For work-related tivities as well, though many of these devices will not only be used for personal tivities. Bring Your Own Device (BYOD) has bee very popular and leads to many security concerns for i . t . (IT) security and safety professionals. The SANS Institute recently reported 61 percent of respondent's organizations allowed BYOD aess to resources (SANS, 2012). That percentage is predictedto rise as the number of devices increases, the functionality of the devices bees that of a PC, and work bees mixed with play beyond the traditional 9-5 Monday through Friday work week. "For many organizations today, the BYOD issue is less a matter of 'No, we can't do it' and more a question of 'how do we do it' (Thomson, 2012)? "Cellular devices, including BYOD and corporate issued devices Authentic Kareem Jackson Jersey , all pose new problems for IT professionals who do not quite know how to handle the problem yet. A recent study of IT security and safety experts revealed 68 percent of them have no way of identifying known cell phone vulnerabilities on their works (Tenable-Security, 2012). "Nearly all survey respondents said cellular devices present a security threat to their business, yet 67 percent said they either have no controls in ple for mobile device usage on their work or staff simply ignore existing phone usage policies (Tenable-Security, 2012)." It is new and rapidly evolving. That's a primary reason this technology is causing so many concerns.Staff the threats to mobile devices as they do their desktop PCs. IT security and safety specialists do not fully understand the implications this technology has on the pany and the steps needed to protect corporate assets. One solution is education. Everyone needs to be educated on smart phone security and the best ple to start is with college students, especially those in technology programs. Those already in the workple will have to play catch up, but a good start is to educate those entering the workforce.This paper reviews cellphone security concerns and develops rendations for education that are in line with Areditation Board for Engineering and Technology (ABET) areditation standards. An example is given of how those rendations are being adapted at a university currently applying for ABET areditation. The following sections provides a literature review of the business needs for rmation security and safety and smart phone security (MDS), the erging cellphone technical issues, and the evolution of the IT curriculum including the requirent for rmation assurance security and safety (IAS) and MDS within the IT curriculum. This paper then suggests mobile device security and safety education rendations, mapped to the Model IT Curriculum as an approh for integrating the MDS into any undergraduate IT program.2. BUSINESSRequirent ForMobile phone SecurityInformation security and safety issues within enterprises are being more plex daily. With increased global business demands Kareem Jackson Jersey , enterprises are finding new areas of security concerns. Annually, since 1980, the Society for Information managent (SIM), together with leading ademic researchers, surveys IT executives about their supervision concerns as well as application and technology investnts and organizational considerations.