Topic > Vulnerability Assessments for Mobile Devices in the BYOD Environment

Index IntroductionDiscussionSecurity issues exist in a BYOD environment which include the followingLack of security controlsUsing untrusted networks and mobile devicesUsing untrusted applications and contentDownloading and installing software updates operating systemConclusionIntroductionMobile devices have become rooted in our personal lives. Today, employees are allowed to use their personal devices in the work environment alongside company-issued devices. Organizations have incorporated these devices into their systems. Organizations cannot physically stop mobile device usage whether for work or individual motivation, but they need to know how to control it. Mobile devices can cause security vulnerabilities in a BYOD environment. Security vulnerabilities result in phishing and unauthorized access to both user and organization data (Disterer & Kleiner, 2013). Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay Discussion There are security concerns in a BYOD environment that include the following Lack of security controls Mobile devices are built with physical security features such as PIN and pattern locks and biometric readers for user authentication. However, most consumers do not use these services, thus leaving their data exposed to third parties who may want to snoop on their data. Other users use PINs, but they use ones that are easily predictable and easy to bypass. Once lost, mobile devices can pose additional vulnerability issues as they could end up in the hands of people who can access data, including credit card numbers and other private data in the devices. Using untrusted networks and mobile devices. Some mobile devices do not encrypt information such as email during transmission. Counterfeit mobile devices do not meet established standards and therefore can be used for identity theft and have poor security. Unencrypted wireless transmissions cause data interception during transmission over the wireless network. When using untrusted networks, eavesdroppers gain easy access to sensitive data and information. Using untrusted applications and content Untrusted applications can steal your information and also do not encrypt the data they receive and transmit over the network. Applications that do not use https result in data interception during transmission. Some websites contain malware that automatically downloads onto users' devices without their knowledge. Accessing untrusted content can also lead to surveillance. Without security software, malware is downloaded onto devices that can be used to phish information. Malware also affects the functionality of mobile devices as they use resources that would otherwise have been used by other applications on the device (Cooney, 2015). These vulnerability issues caused in the BOYD environment need to be resolved to ensure cybersecurity. There are various ways in which policy controls must be implemented for cybersecurity to be successful. These controls include: Enabling user verification on mobile devices. Improving user verification is done through the use of passwords, patterns and PIN codes. There should be user awareness about the benefits of using a password.