preview

Mobile Devices Security On Federal Government Agency

Better Essays

Mobile Security Device Mobile Devices security on Federal Government Agency Team Mates as you know that we have chosen the Requirements in System Development Life Cycle, so have came across the following stages in the Requirements in my research which will be posted below specifically under their requirements. I 'm going to add up Sunmeet 's and Mukesh research too which will help us to make the solid basic points in our PowerPoint slide and ease to present our presentation. The stages are divided in 3 parts - Software, Hardware, and processing which will have their advantages and disadvantages... Introduction on Mobile Devices security – When it comes to security, most mobile devices are a target waiting to be attacked. Smart phones, …show more content…

An operating system that is not a full-fledged desktop or laptop operating system  • Applications available through multiple methods (provided with the operating system, accessed through web browser, acquired and installed from third parties) • Built-in features for synchronizing local data with a remote location (desktop or laptop computer, organization servers, telecommunications provider servers, other third party servers, etc.) Types of traffic increases due to WAN, Internet and wifi/LAN. System development lifecycle is a model that contain a series of steps or stages that involved in the development of a project in other words System development lifecycle is a detailed process requiring careful planning, execution and management There are various system development life cycle models which are: Waterfall Model Spiral model Cyclical Model Company support some of the common mobile app in their devices which causes some threats. Hardware Requirements – Mobile devices should implement the following three mobile security capabilities – Device Integrity: Device integrity is the absence of corruption in the hardware, firmware and software of a device. A mobile device can provide evidence that it has maintained device integrity if the state of the device can be shown to be in a state that is trusted by a relying party. A device has integrity if its software, firmware, and hardware configurations are in a state that is trusted by a relying

Get Access