Categories
Free Sample

Final Disc 5

Our task in this week’s conference is to discuss, mobile phones (including smart phones and tablets). with an emphasis on an auditing system for such phones/devices. Please post responses to  at least two questions below. Reply to at least one main topic response from your classmates with substantive comment. Two quality posts are required for a passing grade.  The solution space should be applicable to phones brought to work as well as to  phones that are not brought to work.  
Let’s have a robust and lively dialogue with respect to the following questions:  

What do you need to log/audit in a mobile phone? Why?  
How is that different from auditing a desktop/laptop/server?
 What tools, methodologies, or frameworks are available to assist us in detecting vulnerabilities and auditing issues in the mobile phone environment?
Is privacy sufficiently catered for? If not how it could be addressed better?

Mobile phones have become pervasive in our lives all over the world.. Although there are many people in the world who still do not own a mobile phone, the penetration of mobile phone usage continues to increase. Today I believe I am correct in saying that China Mobile is the largest mobile phone company in the world with more than 800 million subscribers, i.e., they have more subscribers than the population of the USA.  India’s AirTel has more than 300 million subscribers
More people are becoming “mobile workers” and depend on their smart mobile phones to carry out their daily business as well as their social activities.
It is common for a mobile phone to come equipped with a camera and increasingly popular is the inclusion of a Global Positioning chip (GPS) in order to provide Location Based Services using the GPS satellite system. Of course, mobile phones has various applications (Apps) including email and financial services. 

OER:
OERs

National Institute of Standards and Technology. (2006). . Guide to Computer Security Log Management. NIST Special Publication 800-92. Retrieved from: http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf.
Gupta, S. (2012). The SANS Institute. Logging and Monitoring to Detect Network Intrusions and Compliance Violations in the Environment. Retrieved from: https://www.sans.org/reading-room/whitepapers/detection/paper/33985
OWASP. (Las Revision: 2016). Logging Cheat Sheet. Retrieved from: https://www.owasp.org/index.php/Logging_Cheat_Sheet 
 eSecurityPlanet. Top 10 SIEM Products. Nov. 2018. Retrieved from: https://www.esecurityplanet.com/products/top-siem-products.html

Due Aug 27th

Leave a Reply

Your email address will not be published. Required fields are marked *