preview

Nt1330 Unit 2 Research Paper

Better Essays

SECTION TWO: METHODS AND NETWORK POLICES TO COUNTERMEASURE AND MITIGATE THE RISK OF MV IN ENTERPRISE AND GOVERNMENT’S AGENCIES.
General recommendation and methods used to reduce the risk of MV:

The user authentication method has a crucial role to protect the MD and the data transferred through the network either by using mobile’s internal services provider like Verizon, Mobile, ATT or Wi-Fi network providers in home or office. Many MD, nowadays Used two-way authentication methods and OTP (one-time password) method which consists of generating string of varies of characters and special characters to authenticate the user for one-time session. However, this method used for many organizations and bank’s system, still have its drawbacks when …show more content…

Other methods used were secure tunnel (TLS/SLL) Seed Exchange and Keystore. While, some combine the use of OTP with two-way authentication; this method highly depends on the service provider of the MD and the Phone SIM card number [29,30]. Nevertheless, developers strive to mitigate the MITM attacks with use of multi-authentication methods like finger-print, encrypted connection, ciphering system and algorithms all in different combinations to decrease the risk of exploitations and …show more content…

While, the second method is building (Army App) store with fixed wireless distance and using a special electronic equipment that suited for, the General Army Care and instructors [21]. On the other hand, classified capability of Control MD like Secret Blackberry, secure iPad, TIPSPIRAL(NSA) all equipped with information assurance certification and Accreditation process provide real time access, reliable success decisions and remote scanning and special access key like sensors, cards or fingerprint with independent multi-layer encryption, to prevent security preaches [24].
All in all, the NIST published on July 10th, 2012 A special revision for managing and securing MD against a variety of attacks for both personally-owned and organization-provided devices [39,38]. Stating the two approaches first, centralized management of the MD and alert massaging system to worn server’s management authority, both management methods contribute MD security policies and restrictions provided by the enterprise security administrations to limit the use of application, managing Wi-Fi network connections and constant monitoring system, in addition to third party applications and providing encrypted data communication with intrusion detection and device authentication control. Preventing installing of unauthorized software and prohibit the use rooted or jailbroken

Get Access