Sunday, April 28, 2019

Mobile Device Security Policies Research Paper Example | Topics and Well Written Essays - 500 words

Mobile Device Security Policies - Research Paper ExampleIt mitigates any(prenominal) other forms of softw be and device abuse such as use of pornographic materials. The policies and restrictions apply to every last(predicate) the users in a specified area which is covered with such a policy. This is to protect usage of network. The policies are enforced on anyone who uses the devices, and there are penalties for noncompliance which include civil or criminal litigation, restitutions and fines (Long and Long, p 91).The policies that might be proposed to protect mobile devices may include, but does not narrow to the following in that location must be a password to protect every device (Negri, p63). This is to limit its use to unauthorised persons. It should be a strong password, for example, eight characters in length. Another policy is ensuring physical security of the devices. This is to be ensured by the owners and any other authorized user and ensure the devices are always kept i n a secure place (Bott, p 85). Another policy on mobile devices is that all small and confidential documents stored should be encrypted to ensure security (Henten, p 13). It also ensures data is removed in showcase the device is to be disposed. Mobile device options that are not in use should be handicapped to ensure there are no breaches on any information. Screen locking and screen timeout should be implemented as a security policy. Mobile devices should be scanned for computer viruses this to protect deletion of files by the virus (Calhoun, p 62).Software restrictions policies are part of Microsoft security and management to help their customers to make their devices more sure and manageable (May, p 32). The restrictions ensure that viruses are fought using the best ways possible to avoid termination of data. The guild also restricts which activeX controls can be downloaded. This is to ensure their users use only the recommended software (Panchal and Sabharwal, p 42). The co mpany also insists on using scripts which are digitally signed. This reduces the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.