The Companys Vulnerability of Information Leakages in BioMed Devices – Case Study Example

Download full paperFile format: .doc, available for editing

The paper "The Company’ s Vulnerability of Information Leakages in BioMed Devices"  is a worthy example of a case study on information technology.   It has come to attention that BioMed Company is under threat of information insecurity. This is after some rumors about the information that leaked out from the company about BioMed Devices’ electronic implantable communications new product design. The CEO of BioMed Devices, Rachel James is concerned about the recent reports of GSM phones being vulnerable to call interception. The report is about the company’ s vulnerability to information leakages into the consumers as well as the competitors.

The report is meant to put forth measures to prevent further information leakages by utilizing soft wares such as Global System for Mobile Communications (GSM). In addition parties such as VPN that will keep all the emails pertaining to the phone of the CEO the company’ s computers (Ruan 2013). Risks Many risks associated with GSM exist. There are those that relate to a person and the company. No. Vulnerabilities Threats Impacts Countermeasures 1. A person’ s phone may undergo hacking. Exposure of personal data and accounts. The information could be action plans for the Company. Loss of valuable information to untrusted parties. Copying of techniques by other companies from BioMed. Encrypting codes that undergo constant changes 2. Phone insecurities The collapse of the company. Sense of unease. Lack of confidence in the company by customers. Reduction of sales of the new products. Loss of valuable ideas. Make trusted phone calls. 3. Inherent Security Weaknesses of phones Exposure of Company information Loss of valuable data. Cellcept mobile phones that only allow encrypted mobile calls only. 4. Interrupted and listened to phone calls. Exposure of company information. Interruption of Company activities. Decrypting keys that do not allow passive scanners from operating in real-time. 5. Cyberspace attackers on Company.     Have a high strength signal that captures a specific voice and does not allow it to spread to other areas. The Information security manager will avoid the loss of information into the public to avoid shame.

The CEO will promote the proper management of the company. The GSM will protect the information using second-generation (2G) principles derived from the first one (1G). The GSM deals with cellular phones in terms of the operation of networks. The standard is now the world’ s standard now. The creation of the standard by The European Telecommunication body (EITD) is impressive.

The research emerged with a variety of options in data (information) protection through methods like the use of safety containers, computers with passwords, and limited access. Not all people should have access to certain information, as they would spread the information unnecessarily. The report ended with a three-week plan to achieve the duty of having an Information plan to protect information (Ruan 2013). Smartphone and wireless advances have developed to the point of being indistinguishable since the first radio signs were transmitted in the late nineteenth century. The coming of cell telephones and comparative gadgets has changed business and social collaborations and Internet get to no more relies on upon a wired framework, for example, a modem joined with a phone landline - rather, it can be attained by utilizing a versatile empowered gadget at whatever point and wherever a portable access point is accessible (Bidgoli, 2006).

Such get to focuses or problem areas are currently available in air terminals, lodgings, instructive establishments, and other open structures, and expanding quantities of remote systems are being introduced in business structures and private homes. With developing portable access to remote systems, the outline in the middle of open and closed space is being reclassified.

According to Brown, it has imperative ramifications regarding security for the individuals who make a portable access point accessible and for the individuals who use it. This paper portrays the security and danger components connected with mobile and remote advancements that need to be comprehended and tended to guarantee protected and secure business and individual utilization of versatile innovations (Brown 2011). Data Protection There are a few roles of individuals included in the assurance of data from BioMed Company.

These individuals are the Information security manager who will guarantee that no information relevant to the organization goes into general society. If information goes to the general community, he ought to have a methodology to handle the circumstance, for example, procuring an attorney for help on the off chance that a few individuals need to make pointless activities. Aside from the organization picking a Qualified, Experienced Mobile Security Provider, the CEO will be the leader of the team and concerned with the correct administration of the entire organization while guaranteeing that all divisions work as an inseparable unit for the benefit of society particularly in data assurance.

In conclusion, it is a VPN whose part will be to secure messages of the CEO's telephone and in addition the PC of the organization to maintain a strategic distance from spillage of data superfluously (Gifford 2009).

References

American Society of Insurance Management., & Risk and Insurance Management Society. (1969). Risk management. New York, N.Y: American Society of Insurance Management.

Brown, S. A., & Brown, M. (2011). Ethical issues and security monitoring trends in global healthcare: Technological advancements. Hershey, PA: Medical Information Science Reference.

Bidgoli, H. (2006). Handbook of Information Security Volume 3. Hoboken: John Wiley & Sons.

Black, C., Beken, T. ., Belgium., & Rijksuniversiteit te Gent. (2001). Reporting on organized crime: A shift from description to an explanation in the Belgian annual report on organized crime. Antwerpen: Maklu.

Dhillon, G., & Ebrary, Inc. (2001). Information security management: Global challenges in the new millennium. Hershey, Pa: Idea Group.

Gifford, N. (2009). Information security: Managing legal risks. Sydney: CCH Australia Limited.

Hovenga, E. J. S. (2010). Health informatics: An overview. Amsterdam: IOS Press.

Information Resources Management Association., & Khosrow-Pour, M. (2001). Managing information technology in a global environment. Hershey, PA: Idea Group Publishing.

Norman, T. L. (2007). Integrated security systems design: Concepts, specifications, and implementation. Amsterdam: Elsevier Butterworth-Heinemann.

Ruan, K. (2013). Cybercrime and cloud forensics: Applications for investigation processes. Hershey, PA: Information Science Reference.

Download full paperFile format: .doc, available for editing
Contact Us