Thursday, October 31, 2019

Mobile Device Security Policies Research Paper Example | Topics and Well Written Essays - 500 words

Mobile Device Security Policies - Research Paper Example It mitigates any other forms of software and device abuse such as use of pornographic materials. The policies and restrictions apply to all the users in a specified area which is covered with such a policy. This is to protect usage of network. The policies are enforced on anyone who uses the devices, and there are penalties for noncompliance which include civil or criminal litigation, restitutions and fines (Long and Long, p 91). The policies that might be proposed to protect mobile devices may include, but does not narrow to the following; There must be a password to protect every device (Negri, p63). This is to limit its use to unauthorized persons. It should be a strong password, for example, eight characters in length. Another policy is ensuring physical security of the devices. This is to be ensured by the owners and any other authorized user and ensure the devices are always kept in a secure place (Bott, p 85). Another policy on mobile devices is that all sensitive and confidential documents stored should be encrypted to ensure security (Henten, p 13). It also ensures data is removed in case the device is to be disposed. Mobile device options that are not in use should be disabled to ensure there are no breaches on any information. Screen locking and screen timeout should be implemented as a security policy. Mobile devices should be scanned for viruses this to protect deletion of files by the virus (Ca lhoun, p 62). Software restrictions policies are part of Microsoft security and management to help their customers to make their devices more reliable and manageable (May, p 32). The restrictions ensure that viruses are fought using the best ways possible to avoid loss of data. The company also restricts which activeX controls can be downloaded. This is to ensure their users use only the recommended software (Panchal and Sabharwal, p 42). The company also insists on using scripts which are digitally signed. This reduces the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.