SlideShare ist ein Scribd-Unternehmen logo
1 von 65
Mobile Devices: Control Issues Thomas TszWai Au
Definition of Mobile Devices Mobile phones with computer-like functionality or smartphones Laptops, netbooks, tablet computers Portable digital assistants (PDAs) Portable universal serial bus (USB) devices for storage and for connectivity Radio frequency identification (RFID) devices for data storage, identification and asset management Infrared-enabled (IrDA) devices
Definition of Mobile Devices Mobile phones with computer-like functionality or smartphones Laptops, netbooks, tablet computers Portable digital assistants (PDAs) Portable universal serial bus (USB) devices for storage and for connectivity Radio frequency identification (RFID) devices for data storage, identification and asset management Infrared-enabled (IrDA) devices
Definition of Mobile Devices Mobile phones with computer-like functionality or smartphones Laptops, netbooks, tablet computers Portable digital assistants (PDAs) Portable universal serial bus (USB) devices for storage and for connectivity Radio frequency identification (RFID) devices for data storage, identification and asset management Infrared-enabled (IrDA) devices
Definition of Mobile Devices Mobile phones with computer-like functionality or smartphones Laptops, netbooks, tablet computers Portable digital assistants (PDAs) Portable universal serial bus (USB) devices for storage and for connectivity Radio frequency identification (RFID) devices for data storage, identification and asset management Infrared-enabled (IrDA) devices
Definition of Mobile Devices Mobile phones with computer-like functionality or smartphones Laptops, netbooks, tablet computers Portable digital assistants (PDAs) Radio frequency identification (RFID) devices for data storage, identification and asset management Infrared-enabled (IrDA) devices ,[object Object],[object Object]
Definition of Mobile Devices Mobile phones with computer-like functionality or smartphones Laptops, netbooks, tablet computers Portable digital assistants (PDAs) Portable universal serial bus (USB) devices for storage and for connectivity Radio frequency identification (RFID) devices for data storage, identification and asset management Infrared-enabled (IrDA) devices
Current Environment Business Performance Management (BPM) Study: 25% of all mobile devices used in the organizations are contain vital applications and information 40% of the organizations do not manage mobile data tracking, backup, and archiving for regulatory purposes Only 32.4% of small businesses ($100 million in revenue and under) implement formal mobile compliance policies Source: Refer to references
Current Environment Business Performance Management (BPM) Study: 40% of the organizations do not manage mobile data tracking, backup, and archiving for regulatory purposes Only 32.4% of small businesses ($100 million in revenue and under) implement formal mobile compliance policies ,[object Object],Source: Refer to references
Current Environment Business Performance Management (BPM) Study: 25% of all mobile devices used in the organizations are contain vital applications and information Only 32.4% of small businesses ($100 million in revenue and under) implement formal mobile compliance policies ,[object Object],Source: Refer to references
Current Environment Business Performance Management (BPM) Study: 25% of all mobile devices used in the organizations are contain vital applications and information 40% of the organizations do not manage mobile data tracking, backup, and archiving for regulatory purposes Only 32.4% of small businesses ($100 million in revenue and under) implement formal mobile compliance policies Source: Refer to references
Current Environment Findings from 22nd AICPA Top Technology Initiative Survey and India Study: 90% said the biggest challenge confronting IT professionals is the control and use of mobile devices No companies reported that improving data security is among their board’s top three priorities 6% said they have an IT or data security committee 47% said they have a Chief Information Security Officer 50% have not implemented policies or systems to mitigate the threat Source: Refer to references
Current Environment Findings from 22nd AICPA Top Technology Initiative Survey and India Study: 90% said the biggest challenge confronting IT professionals is the control and use of mobile devices 6% said they have an IT or data security committee 47% said they have a Chief Information Security Officer 50% have not implemented policies or systems to mitigate the threat ,[object Object],Source: Refer to references
Current Environment Findings from 22nd AICPA Top Technology Initiative Survey and India Study: 90% said the biggest challenge confronting IT professionals is the control and use of mobile devices No companies reported that improving data security is among their board’s top three priorities 47% said they have a Chief Information Security Officer 50% have not implemented policies or systems to mitigate the threat ,[object Object],Source: Refer to references
Current Environment Findings from 22nd AICPA Top Technology Initiative Survey and India Study: 90% said the biggest challenge confronting IT professionals is the control and use of mobile devices No companies reported that improving data security is among their board’s top three priorities 6% said they have an IT or data security committee 47% said they have a Chief Information Security Officer 50% have not implemented policies or systems to mitigate the threat Source: Refer to references
Current Environment Findings from 22nd AICPA Top Technology Initiative Survey and India Study: 90% said the biggest challenge confronting IT professionals is the control and use of mobile devices No companies reported that improving data security is among their board’s top three priorities 6% said they have an IT or data security committee 47% said they have a Chief Information Security Officer ,[object Object],Source: Refer to references
Benefits Increased workforce productivity Improved customer service Improved turnaround times for problem resolutions Response to customer problems and questions Increased business process efficiency Improved employee security and safety Improved employee retention Source: ISACA – Securing Mobile Devices
Benefits Increased workforce productivity Improved customer service Improved turnaround times for problem resolutions Response to customer problems and questions Increased business process efficiency Improved employee security and safety Improved employee retention Source: ISACA – Securing Mobile Devices
Benefits Increased workforce productivity Improved customer service Improved turnaround times for problem resolutions Response to customer problems and questions Increased business process efficiency Improved employee security and safety Improved employee retention Source: ISACA – Securing Mobile Devices
Benefits Increased workforce productivity Improved customer service Response to customer problems and questions Increased business process efficiency Improved employee security and safety Improved employee retention ,[object Object],Source: ISACA – Securing Mobile Devices
Benefits Increased workforce productivity Improved customer service Improved turnaround times for problem resolutions Response to customer problems and questions Increased business process efficiency Improved employee security and safety Improved employee retention Source: ISACA – Securing Mobile Devices
Benefits Increased workforce productivity Improved customer service Improved turnaround times for problem resolutions Response to customer problems and questions Improved employee security and safety Improved employee retention ,[object Object],Source: ISACA – Securing Mobile Devices
Benefits Increased workforce productivity Improved customer service Improved turnaround times for problem resolutions Response to customer problems and questions Increased business process efficiency Improved employee retention ,[object Object],Source: ISACA – Securing Mobile Devices
Benefits Increased workforce productivity Improved customer service Improved turnaround times for problem resolutions Response to customer problems and questions Increased business process efficiency Improved employee security and safety Improved employee retention Source: ISACA – Securing Mobile Devices
Risks Types of Risks: Financial Financial losses Legal & Regulatory Stolen confidential information Inaccurate reporting Vulnerabilities Loss, theft, and corruption of data or device
Risks Types of Risks: Financial Financial losses Legal & Regulatory Stolen confidential information Inaccurate reporting Vulnerabilities Loss, theft, and corruption of data or device
Risks Types of Risks: Financial Financial losses Legal & Regulatory Stolen confidential information Inaccurate reporting Vulnerabilities Loss, theft, and corruption of data or device
Risks Types of Risks: Financial Financial losses Legal & Regulatory Stolen confidential information Inaccurate reporting Vulnerabilities Loss, theft, and corruption of data or device
Risk Mitigation Update existing or create new mobile device strategies while considering the organizational culture, technology and governance as it will help ensure risks are appropriately accounted for and managed. Establish policies to support the mobile device strategy’s goals while leveraging available technology and mitigating risks. When introducing a mobile device, ensure it fits the corporate strategy and objectives by using a proven framework(i.e. COBIT). Source: ISACA – Securing Mobile Devices
Mobile Device Strategy Should be tailored to address risks specific to the company. Consider the company’s: Technology Culture Governance
Mobile Device Policy Define allowable device types Defining the nature of services accessible through the devices Identifying the way people use the devices Integrating all enterprise-issued devices into an asset management program Describing the authentication and encryption needed on the devices Outlining the tasks for which employees may use the devices and the types of applications that are allowed Clarifying how data should be securely stored and transmitted Simple to implement and support Centrally managed by the company itself Flexible for administering users and devices Focused on hindering loss or theft Auditable in all of its parts Tested and verified in disaster response Attentive to possible external threats Source: ISACA – Securing Mobile Devices
Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
Implications – Chartered Accountants (CAs) CAs assess internal controls to determine the appropriate audit approach. Mobile devices pose risks to internal controls failing to achieve: Reliability on financial reporting Efficiency and effectiveness of its operations Compliance with laws and regulations
Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist ,[object Object],Source: Davis, C., & Schiller, M.
Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist ,[object Object],Source: Davis, C., & Schiller, M.
Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen ,[object Object],Source: Davis, C., & Schiller, M.
Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
Conclusion Mobile devices has definitely enhanced availability, productivity, and efficiency of business processes.  However, the device and its data can be lost, corrupted, damaged, or stolen which may do harm to the exact items it was originally enhancing.  Many executives recognize there is a risk associated with these devices, but do not implement sufficient controls to mitigate the risks.  Recommendation: Develop a strategy to manage mobile devices Develop policies to support the strategy Use proven frameworks to assess IT technology when using or introducing new devices
References All music  used were attained from: http://www.partnersinrhyme.com/pir/free_music_loops.shtml AICPA. (2011, February 15). Surging Business Use of Mobile Devices is Top Business IT Challenge; AICPA Survey. Retrieved May 5, 2011, from AICPA: http://www.aicpa.org/PRESS/PRESSRELEASES/2011/Pages/2011TopTechnologySurvey.aspx  Blank, P. (2010, July 2). Compliance concerns delay banks introducing iPhone trading. Retrieved May 5, 2011, from Finextra: http://www.finextra.com/community/fullblog.aspx?blogid=4236 Brenner, B. (2006, October 20). Infected iPods a threat to corporate networks. Retrieved May 5, 2011, from SearchSecurityChannel.com: http://searchsecurity.techtarget.com/news/1225559/Infected-iPods-a-threat-to-corporate-networks Cobb, M. (2009, January 8). Can USB compromise the security of an embedded mobile device? Retrieved May 5, 2011, from SearchSecurity.com: http://searchsecurity.techtarget.com/answer/Can-USB-compromise-the-security-of-an-embedded-mobile-device Computer Security Update. (2007, January 1). Mobile Devices Expose Firms to Compliance/Security Risks. Computer Security Update: Vol. 8. Issue. 1. COSO. (n.d.). Internal Control - Integrated Framework. Retrieved June 30, 2011, from COSO.org: http://www.coso.org/IC-IntegratedFramework-summary.htm Davis, C., & Schiller, M. (2011, April 12). 10 Steps for Auditing Mobile Computing Security. Retrieved May 5, 2011, from Enterprise Systems: http://esj.com/Articles/2011/04/12/IT-Auditing-Mobile-Security.aspx?p=1 Expert Names Top 10 Audit Issues of 2009. (2009). Retrieved May 5, 2011, from InternetNews.com: http://www.internetnews.com/government/article.php/3819156/Expert-Names-Top-10-Audit-Issues-of-2009.htm Fell, J. (2011, April 19). Mobile devices and the law: What are the legal issues? Retrieved May 5, 2011, from computing.co.uk: http://www.computing.co.uk/ctg/feature/2044628/mobile-devices-law
References Gupta, U. (2011, June 6). How Effective are Mobile Security Policies? Retrieved June 8, 2011, from Bank Info Security: http://blogs.bankinfosecurity.asia/posts.php?postID=967 Hernacki, B. (2006). Improving Bluetooth Security: What IT Managers and Mobile Device Users Can do. Information Security Journal. Vol 15. Issue 4. , 39-42. ISACA. (n.d.). COBIT - IT Governance Framework. Retrieved June 30, 2011, from ISACA: http://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx ISACA. (2011, June 1). ISACA Survey: IT Leaders in India Believe Mobile Devices Pose Serious Risk to Enterprises. Retrieved June 7, 2011, from Asia Pulse Pty Ltd.: http://proquest.umi.com.proxy.lib.uwaterloo.ca/pqdweb?index=5&did=2363825061&SrchMode=2&sid=2&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1307655836&clientId=16746  ISACA. (2010). Securing Mobile Devices. An ISACA Emerging Technology White Paper , 1-10. Juniper Networks. (2011, January). Mobile Device Security - Emerging Threats, Essential Strategies: Key Capabilities for Safeguarding Mobile Devices and Corporate Assets. Retrieved May 5, 2011, from Juniper Networks: http://www.juniper.net/us/en/local/pdf/whitepapers/2000372-en.pdf Levick, R. S. (2011, May 3). Sony's Cyberattack and How Companies Fail in Data Security. Retrieved May 5, 2011, from FastCompany.com: http://www.fastcompany.com/1751318/directors-are-disengaged-on-data-security Parizo, E. (2008, April 7). HP: Would you like some malware with your server? Retrieved May 5, 2011, from IT Knowledge Exchange: http://itknowledgeexchange.techtarget.com/security-bytes/hp-would-you-like-some-malware-with-your-server/ Vijayan, J. (2011, March 29). BP employee loses laptop containing data on 13,000 oil spill claimants. Retrieved May 5, 2011, from ComputerWorld: http://www.computerworld.com/s/article/9215316/BP_employee_loses_laptop_containing_data_on_13_000_oil_spill_claimants White, M. (2010, June 30). Drunk oil trader banned and fined. Retrieved May 5, 2011, from finextra: http://www.finextra.com/news/fullstory.aspx?newsitemid=21554
IT Mobile Devices and Control Issues

Weitere ähnliche Inhalte

Was ist angesagt?

International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryCompTIA
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryCompTIA
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...TELKOMNIKA JOURNAL
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareChromeInfo Technologies
 
CompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary FinalCompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary FinalAssespro Nacional
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannFrank Siepmann
 

Was ist angesagt? (7)

International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand Summary
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 
CompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary FinalCompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary Final
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
 

Andere mochten auch

Maria Dahlman Ström - Final Thesis
Maria Dahlman Ström - Final ThesisMaria Dahlman Ström - Final Thesis
Maria Dahlman Ström - Final ThesisMaria Dahlman Ström
 
David Ramos 11.14
David Ramos 11.14David Ramos 11.14
David Ramos 11.14David Ramos
 
돌아와요아저씨『SX797』『СOM』온라인카지노
돌아와요아저씨『SX797』『СOM』온라인카지노돌아와요아저씨『SX797』『СOM』온라인카지노
돌아와요아저씨『SX797』『СOM』온라인카지노ghjdfsg
 
스포츠배팅 ''SX797.COM'' 개경주전략
스포츠배팅 ''SX797.COM'' 개경주전략스포츠배팅 ''SX797.COM'' 개경주전략
스포츠배팅 ''SX797.COM'' 개경주전략ghjdfsg
 
მე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერება
მე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერებამე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერება
მე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერებაKhatushka Gvritishvili
 
Cách làm gối ôm hình gấu trúc
Cách làm gối ôm hình gấu trúcCách làm gối ôm hình gấu trúc
Cách làm gối ôm hình gấu trúcBibiyeu Qx
 

Andere mochten auch (11)

Maria Dahlman Ström - Final Thesis
Maria Dahlman Ström - Final ThesisMaria Dahlman Ström - Final Thesis
Maria Dahlman Ström - Final Thesis
 
Jacobs Law, LLC
Jacobs Law, LLCJacobs Law, LLC
Jacobs Law, LLC
 
Citysearch com
Citysearch comCitysearch com
Citysearch com
 
David Ramos 11.14
David Ramos 11.14David Ramos 11.14
David Ramos 11.14
 
돌아와요아저씨『SX797』『СOM』온라인카지노
돌아와요아저씨『SX797』『СOM』온라인카지노돌아와요아저씨『SX797』『СOM』온라인카지노
돌아와요아저씨『SX797』『СOM』온라인카지노
 
스포츠배팅 ''SX797.COM'' 개경주전략
스포츠배팅 ''SX797.COM'' 개경주전략스포츠배팅 ''SX797.COM'' 개경주전략
스포츠배팅 ''SX797.COM'' 개경주전략
 
მე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერება
მე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერებამე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერება
მე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერება
 
Cách làm gối ôm hình gấu trúc
Cách làm gối ôm hình gấu trúcCách làm gối ôm hình gấu trúc
Cách làm gối ôm hình gấu trúc
 
პრეზენტაცია
პრეზენტაციაპრეზენტაცია
პრეზენტაცია
 
Exposicion cct torax
Exposicion cct toraxExposicion cct torax
Exposicion cct torax
 
Russell westbrook
Russell westbrookRussell westbrook
Russell westbrook
 

Ähnlich wie IT Mobile Devices and Control Issues

Driving Value to the Next Generation Supply Chain through Technology - What N...
Driving Value to the Next Generation Supply Chain through Technology - What N...Driving Value to the Next Generation Supply Chain through Technology - What N...
Driving Value to the Next Generation Supply Chain through Technology - What N...Richard Sebastian
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
HIPAA Compliance for Pediatric Practices
HIPAA Compliance for Pediatric PracticesHIPAA Compliance for Pediatric Practices
HIPAA Compliance for Pediatric PracticesPaul Vanchiere, MBA
 
RFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauRFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauHIMSS
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?Lumension
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governancejkllee
 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governancejkllee
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
Using RFID to Track Tools and Equipment
Using RFID to Track Tools and EquipmentUsing RFID to Track Tools and Equipment
Using RFID to Track Tools and EquipmentImpinj RFID
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Lumension
 
RFID in APAC
RFID in APACRFID in APAC
RFID in APACkumarpg
 
Transforming Pharmacovigilance from Operational to Scientifically Driven
Transforming Pharmacovigilance from Operational to Scientifically DrivenTransforming Pharmacovigilance from Operational to Scientifically Driven
Transforming Pharmacovigilance from Operational to Scientifically DrivenVeeva Systems
 
The Roadmap to a Best-In-Class Safety Strategy
The Roadmap to a Best-In-Class Safety StrategyThe Roadmap to a Best-In-Class Safety Strategy
The Roadmap to a Best-In-Class Safety StrategyRemedy Interactive
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 

Ähnlich wie IT Mobile Devices and Control Issues (20)

Driving Value to the Next Generation Supply Chain through Technology - What N...
Driving Value to the Next Generation Supply Chain through Technology - What N...Driving Value to the Next Generation Supply Chain through Technology - What N...
Driving Value to the Next Generation Supply Chain through Technology - What N...
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
HIPAA Compliance for Pediatric Practices
HIPAA Compliance for Pediatric PracticesHIPAA Compliance for Pediatric Practices
HIPAA Compliance for Pediatric Practices
 
RFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauRFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim Bloedau
 
Digital POV-Chemical Industries
Digital POV-Chemical IndustriesDigital POV-Chemical Industries
Digital POV-Chemical Industries
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governance
 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governance
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
Using RFID to Track Tools and Equipment
Using RFID to Track Tools and EquipmentUsing RFID to Track Tools and Equipment
Using RFID to Track Tools and Equipment
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
 
RFID in APAC
RFID in APACRFID in APAC
RFID in APAC
 
Transforming Pharmacovigilance from Operational to Scientifically Driven
Transforming Pharmacovigilance from Operational to Scientifically DrivenTransforming Pharmacovigilance from Operational to Scientifically Driven
Transforming Pharmacovigilance from Operational to Scientifically Driven
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
The Roadmap to a Best-In-Class Safety Strategy
The Roadmap to a Best-In-Class Safety StrategyThe Roadmap to a Best-In-Class Safety Strategy
The Roadmap to a Best-In-Class Safety Strategy
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 

Kürzlich hochgeladen

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 

Kürzlich hochgeladen (20)

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 

IT Mobile Devices and Control Issues

  • 1. Mobile Devices: Control Issues Thomas TszWai Au
  • 2. Definition of Mobile Devices Mobile phones with computer-like functionality or smartphones Laptops, netbooks, tablet computers Portable digital assistants (PDAs) Portable universal serial bus (USB) devices for storage and for connectivity Radio frequency identification (RFID) devices for data storage, identification and asset management Infrared-enabled (IrDA) devices
  • 3. Definition of Mobile Devices Mobile phones with computer-like functionality or smartphones Laptops, netbooks, tablet computers Portable digital assistants (PDAs) Portable universal serial bus (USB) devices for storage and for connectivity Radio frequency identification (RFID) devices for data storage, identification and asset management Infrared-enabled (IrDA) devices
  • 4. Definition of Mobile Devices Mobile phones with computer-like functionality or smartphones Laptops, netbooks, tablet computers Portable digital assistants (PDAs) Portable universal serial bus (USB) devices for storage and for connectivity Radio frequency identification (RFID) devices for data storage, identification and asset management Infrared-enabled (IrDA) devices
  • 5. Definition of Mobile Devices Mobile phones with computer-like functionality or smartphones Laptops, netbooks, tablet computers Portable digital assistants (PDAs) Portable universal serial bus (USB) devices for storage and for connectivity Radio frequency identification (RFID) devices for data storage, identification and asset management Infrared-enabled (IrDA) devices
  • 6.
  • 7. Definition of Mobile Devices Mobile phones with computer-like functionality or smartphones Laptops, netbooks, tablet computers Portable digital assistants (PDAs) Portable universal serial bus (USB) devices for storage and for connectivity Radio frequency identification (RFID) devices for data storage, identification and asset management Infrared-enabled (IrDA) devices
  • 8. Current Environment Business Performance Management (BPM) Study: 25% of all mobile devices used in the organizations are contain vital applications and information 40% of the organizations do not manage mobile data tracking, backup, and archiving for regulatory purposes Only 32.4% of small businesses ($100 million in revenue and under) implement formal mobile compliance policies Source: Refer to references
  • 9.
  • 10.
  • 11. Current Environment Business Performance Management (BPM) Study: 25% of all mobile devices used in the organizations are contain vital applications and information 40% of the organizations do not manage mobile data tracking, backup, and archiving for regulatory purposes Only 32.4% of small businesses ($100 million in revenue and under) implement formal mobile compliance policies Source: Refer to references
  • 12. Current Environment Findings from 22nd AICPA Top Technology Initiative Survey and India Study: 90% said the biggest challenge confronting IT professionals is the control and use of mobile devices No companies reported that improving data security is among their board’s top three priorities 6% said they have an IT or data security committee 47% said they have a Chief Information Security Officer 50% have not implemented policies or systems to mitigate the threat Source: Refer to references
  • 13.
  • 14.
  • 15. Current Environment Findings from 22nd AICPA Top Technology Initiative Survey and India Study: 90% said the biggest challenge confronting IT professionals is the control and use of mobile devices No companies reported that improving data security is among their board’s top three priorities 6% said they have an IT or data security committee 47% said they have a Chief Information Security Officer 50% have not implemented policies or systems to mitigate the threat Source: Refer to references
  • 16.
  • 17. Benefits Increased workforce productivity Improved customer service Improved turnaround times for problem resolutions Response to customer problems and questions Increased business process efficiency Improved employee security and safety Improved employee retention Source: ISACA – Securing Mobile Devices
  • 18. Benefits Increased workforce productivity Improved customer service Improved turnaround times for problem resolutions Response to customer problems and questions Increased business process efficiency Improved employee security and safety Improved employee retention Source: ISACA – Securing Mobile Devices
  • 19. Benefits Increased workforce productivity Improved customer service Improved turnaround times for problem resolutions Response to customer problems and questions Increased business process efficiency Improved employee security and safety Improved employee retention Source: ISACA – Securing Mobile Devices
  • 20.
  • 21. Benefits Increased workforce productivity Improved customer service Improved turnaround times for problem resolutions Response to customer problems and questions Increased business process efficiency Improved employee security and safety Improved employee retention Source: ISACA – Securing Mobile Devices
  • 22.
  • 23.
  • 24. Benefits Increased workforce productivity Improved customer service Improved turnaround times for problem resolutions Response to customer problems and questions Increased business process efficiency Improved employee security and safety Improved employee retention Source: ISACA – Securing Mobile Devices
  • 25. Risks Types of Risks: Financial Financial losses Legal & Regulatory Stolen confidential information Inaccurate reporting Vulnerabilities Loss, theft, and corruption of data or device
  • 26. Risks Types of Risks: Financial Financial losses Legal & Regulatory Stolen confidential information Inaccurate reporting Vulnerabilities Loss, theft, and corruption of data or device
  • 27. Risks Types of Risks: Financial Financial losses Legal & Regulatory Stolen confidential information Inaccurate reporting Vulnerabilities Loss, theft, and corruption of data or device
  • 28. Risks Types of Risks: Financial Financial losses Legal & Regulatory Stolen confidential information Inaccurate reporting Vulnerabilities Loss, theft, and corruption of data or device
  • 29. Risk Mitigation Update existing or create new mobile device strategies while considering the organizational culture, technology and governance as it will help ensure risks are appropriately accounted for and managed. Establish policies to support the mobile device strategy’s goals while leveraging available technology and mitigating risks. When introducing a mobile device, ensure it fits the corporate strategy and objectives by using a proven framework(i.e. COBIT). Source: ISACA – Securing Mobile Devices
  • 30. Mobile Device Strategy Should be tailored to address risks specific to the company. Consider the company’s: Technology Culture Governance
  • 31. Mobile Device Policy Define allowable device types Defining the nature of services accessible through the devices Identifying the way people use the devices Integrating all enterprise-issued devices into an asset management program Describing the authentication and encryption needed on the devices Outlining the tasks for which employees may use the devices and the types of applications that are allowed Clarifying how data should be securely stored and transmitted Simple to implement and support Centrally managed by the company itself Flexible for administering users and devices Focused on hindering loss or theft Auditable in all of its parts Tested and verified in disaster response Attentive to possible external threats Source: ISACA – Securing Mobile Devices
  • 32. Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
  • 33. Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
  • 34. Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
  • 35. Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
  • 36. Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
  • 37. Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
  • 38. Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
  • 39. Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
  • 40. Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
  • 41. Proven Frameworks (COBIT) Implementation is aligned with corporate strategy and objectives Value adding Risks are addressed Fits the corporate culture Compatible with users of the company Compatible with the technical architecture of the company External factors are considered Sufficient support with appropriate resources Monitored with appropriate performance metrics Source: ISACA – Securing Mobile Devices
  • 42. Implications – Chartered Accountants (CAs) CAs assess internal controls to determine the appropriate audit approach. Mobile devices pose risks to internal controls failing to achieve: Reliability on financial reporting Efficiency and effectiveness of its operations Compliance with laws and regulations
  • 43. Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
  • 44. Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
  • 45. Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
  • 46.
  • 47.
  • 48. Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
  • 49. Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
  • 50. Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
  • 51. Implications – Chartered Accountants Procedures: Ensure that mobile device management software is running the latest approved software and patches Verify that mobile clients have protective features enabled if they are required by your mobile device security policy. Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device Evaluate the use of security monitoring software and processes Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices. Evaluate procedures in place for tracking end user trouble tickets Ensure that appropriate security policies are in place for your mobile devices Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen Evaluate whether effective change management processes exist Source: Davis, C., & Schiller, M.
  • 52.
  • 53. Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
  • 54. Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
  • 55. Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
  • 56. Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
  • 57. Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
  • 58. Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
  • 59. Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
  • 60. Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
  • 61. Implications – Chartered Accountants (CAs) Consider the following items when confirming operational efficiency: Policy Antivirus updates Encryption Secure transmission Device management Access control Awareness training Risk
  • 62. Conclusion Mobile devices has definitely enhanced availability, productivity, and efficiency of business processes. However, the device and its data can be lost, corrupted, damaged, or stolen which may do harm to the exact items it was originally enhancing. Many executives recognize there is a risk associated with these devices, but do not implement sufficient controls to mitigate the risks. Recommendation: Develop a strategy to manage mobile devices Develop policies to support the strategy Use proven frameworks to assess IT technology when using or introducing new devices
  • 63. References All music used were attained from: http://www.partnersinrhyme.com/pir/free_music_loops.shtml AICPA. (2011, February 15). Surging Business Use of Mobile Devices is Top Business IT Challenge; AICPA Survey. Retrieved May 5, 2011, from AICPA: http://www.aicpa.org/PRESS/PRESSRELEASES/2011/Pages/2011TopTechnologySurvey.aspx Blank, P. (2010, July 2). Compliance concerns delay banks introducing iPhone trading. Retrieved May 5, 2011, from Finextra: http://www.finextra.com/community/fullblog.aspx?blogid=4236 Brenner, B. (2006, October 20). Infected iPods a threat to corporate networks. Retrieved May 5, 2011, from SearchSecurityChannel.com: http://searchsecurity.techtarget.com/news/1225559/Infected-iPods-a-threat-to-corporate-networks Cobb, M. (2009, January 8). Can USB compromise the security of an embedded mobile device? Retrieved May 5, 2011, from SearchSecurity.com: http://searchsecurity.techtarget.com/answer/Can-USB-compromise-the-security-of-an-embedded-mobile-device Computer Security Update. (2007, January 1). Mobile Devices Expose Firms to Compliance/Security Risks. Computer Security Update: Vol. 8. Issue. 1. COSO. (n.d.). Internal Control - Integrated Framework. Retrieved June 30, 2011, from COSO.org: http://www.coso.org/IC-IntegratedFramework-summary.htm Davis, C., & Schiller, M. (2011, April 12). 10 Steps for Auditing Mobile Computing Security. Retrieved May 5, 2011, from Enterprise Systems: http://esj.com/Articles/2011/04/12/IT-Auditing-Mobile-Security.aspx?p=1 Expert Names Top 10 Audit Issues of 2009. (2009). Retrieved May 5, 2011, from InternetNews.com: http://www.internetnews.com/government/article.php/3819156/Expert-Names-Top-10-Audit-Issues-of-2009.htm Fell, J. (2011, April 19). Mobile devices and the law: What are the legal issues? Retrieved May 5, 2011, from computing.co.uk: http://www.computing.co.uk/ctg/feature/2044628/mobile-devices-law
  • 64. References Gupta, U. (2011, June 6). How Effective are Mobile Security Policies? Retrieved June 8, 2011, from Bank Info Security: http://blogs.bankinfosecurity.asia/posts.php?postID=967 Hernacki, B. (2006). Improving Bluetooth Security: What IT Managers and Mobile Device Users Can do. Information Security Journal. Vol 15. Issue 4. , 39-42. ISACA. (n.d.). COBIT - IT Governance Framework. Retrieved June 30, 2011, from ISACA: http://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx ISACA. (2011, June 1). ISACA Survey: IT Leaders in India Believe Mobile Devices Pose Serious Risk to Enterprises. Retrieved June 7, 2011, from Asia Pulse Pty Ltd.: http://proquest.umi.com.proxy.lib.uwaterloo.ca/pqdweb?index=5&did=2363825061&SrchMode=2&sid=2&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1307655836&clientId=16746 ISACA. (2010). Securing Mobile Devices. An ISACA Emerging Technology White Paper , 1-10. Juniper Networks. (2011, January). Mobile Device Security - Emerging Threats, Essential Strategies: Key Capabilities for Safeguarding Mobile Devices and Corporate Assets. Retrieved May 5, 2011, from Juniper Networks: http://www.juniper.net/us/en/local/pdf/whitepapers/2000372-en.pdf Levick, R. S. (2011, May 3). Sony's Cyberattack and How Companies Fail in Data Security. Retrieved May 5, 2011, from FastCompany.com: http://www.fastcompany.com/1751318/directors-are-disengaged-on-data-security Parizo, E. (2008, April 7). HP: Would you like some malware with your server? Retrieved May 5, 2011, from IT Knowledge Exchange: http://itknowledgeexchange.techtarget.com/security-bytes/hp-would-you-like-some-malware-with-your-server/ Vijayan, J. (2011, March 29). BP employee loses laptop containing data on 13,000 oil spill claimants. Retrieved May 5, 2011, from ComputerWorld: http://www.computerworld.com/s/article/9215316/BP_employee_loses_laptop_containing_data_on_13_000_oil_spill_claimants White, M. (2010, June 30). Drunk oil trader banned and fined. Retrieved May 5, 2011, from finextra: http://www.finextra.com/news/fullstory.aspx?newsitemid=21554