CIS 502 MENTOR Education is Power/cis502mentor.com CIS 502 MENTOR Education is Power/cis502mentor.co | Page 45
CIS 502 Week 7 Case Study 3 – Strayer New
Case Study 3 : Mobile Devices Security
Due Week 7 and worth 100 points
The use of mobile devices is prevalent and growing rapidly as users heavily depend on them . Unfortunately , attackers follow the money and user population . In addition , mobile devices do not receive patches for their vulnerabilities . The Zeus-in-the- Mobile ( ZitMo ) attack against Android users is an example defeating the emerging technology to steal user ’ s credentials and ultimately money . Mobile devices can also spread malware .
Read the article titled , “ Mobile device attacks surge ”, located at http :// www . treasuryandrisk . com / 2011 / 02 / 08 / pr-mobile-deviceattacks-surge , and FIPS 140-2 Security Policy , located at http :// csrc . nist . gov / groups / STM / cmvp / documents / 140- 1 / 140sp / 140sp1648 . pdf . In addition , read the report titled , “ Emerging Cyber Threats 2012 ”, located at
www . cis502mentor . com
CIS 502 Week 7 Case Study 3 – Strayer New
Case Study 3 : Mobile Devices Security
Due Week 7 and worth 100 points
The use of mobile devices is prevalent and growing rapidly as users heavily depend on them . Unfortunately , attackers follow the money and user population . In addition , mobile devices do not receive patches for their vulnerabilities . The Zeus-in-the- Mobile ( ZitMo ) attack against Android users is an example defeating the emerging technology to steal user ’ s credentials and ultimately money . Mobile devices can also spread malware .
Read the article titled , “ Mobile device attacks surge ”, located at http :// www . treasuryandrisk . com / 2011 / 02 / 08 / pr-mobile-deviceattacks-surge , and FIPS 140-2 Security Policy , located at http :// csrc . nist . gov / groups / STM / cmvp / documents / 140- 1 / 140sp / 140sp1648 . pdf . In addition , read the report titled , “ Emerging Cyber Threats 2012 ”, located at