not receive patches for their vulnerabilities . The Zeus-in-the- Mobile ( ZitMo ) attack against Android users is an example defeating the emerging technology to steal user ’ s credentials and ultimately money . Mobile devices can also spread malware .
Read the article titled , “ Mobile device attacks surge ”, located at http :// www . treasuryandrisk . com / 2011 / 02 / 08 / pr-mobile-deviceattacks-surge , and FIPS 140-2 Security Policy , located at http :// csrc . nist . gov / groups / STM / cmvp / documents / 140- 1 / 140sp / 140sp1648 . pdf . In addition , read the report titled , “ Emerging Cyber Threats 2012 ”, located at http :// www . gtisc . gatech . edu / doc / emerging _ cyber _ threats _ report 2012 . pdf .
Write a five to eight ( 5-8 ) page paper in which you :
1 . Describe the emerging cybersecurity issues and vulnerabilities presented in the “ Emerging Cyber Threats 2012 ” report .
2 . Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices .
3 . Assess and describe the value of cryptography and encryption in regard to Equifax ’ s approach to implementing stronger security policies around mobile devices .
4 . Justify Gunter Ollmann ’ s comments about Zeus-in-the- Mobile ( ZitMo ) and describe the implications of advanced security breaches such as this .
not receive patches for their vulnerabilities . The Zeus-in-the- Mobile ( ZitMo ) attack against Android users is an example defeating the emerging technology to steal user ’ s credentials and ultimately money . Mobile devices can also spread malware .
Read the article titled , “ Mobile device attacks surge ”, located at http :// www . treasuryandrisk . com / 2011 / 02 / 08 / pr-mobile-deviceattacks-surge , and FIPS 140-2 Security Policy , located at http :// csrc . nist . gov / groups / STM / cmvp / documents / 140- 1 / 140sp / 140sp1648 . pdf . In addition , read the report titled , “ Emerging Cyber Threats 2012 ”, located at http :// www . gtisc . gatech . edu / doc / emerging _ cyber _ threats _ report 2012 . pdf .
Write a five to eight ( 5-8 ) page paper in which you :
1 . Describe the emerging cybersecurity issues and vulnerabilities presented in the “ Emerging Cyber Threats 2012 ” report .
2 . Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices .
3 . Assess and describe the value of cryptography and encryption in regard to Equifax ’ s approach to implementing stronger security policies around mobile devices .
4 . Justify Gunter Ollmann ’ s comments about Zeus-in-the- Mobile ( ZitMo ) and describe the implications of advanced security breaches such as this .