Monday, April 23, 2007

Do the advantages outweight the disadvantages?

Rokeshia Robinson
1st Follow-up paper
Mobile Computing Devices


Accroding to wikipedia, as well as our presentation, mobile computing is a generic term describing the ability to use technology that is not physically connected, or in remote or mobile (non static) environments. The term is evolved in modern usage such that it requires that the mobile computing activitiy be connected wirelessly to and throught the internet or to and through a private network. This connection ties the mobile device to centrally locate information and application software throught the use of battery powered, portable, and wireless computing and communication devices. Mobility characterizes the degree to which each element is mobile within the context of the business process. Some elements, such as desktop computers and personnel, are always stationary, while others, such as laptop computers and traveling salespersons, could be mobile.

Professor Sergent pointed out that the fact that a person is naturally mobile does not imply that she/he is mobile within the context of the business process. Furthermore, mobility has to be beyond a certain distance to be relevant. In addition, not every mobile computing device is wireless. A mobile device needs to have a wireless networking car or modern in order to remotely access the internet. (which can be purchased by an ISP)
With that said, I want turn focus to the Disadvantages of mobile computing devices. Disadvantages to mobile computing devices include a higher cost per dollar, a more limited upgrade path, and sometimes a compromise on keyboard, pointing device, battery life, and screen resolution. One of the major disadvantages about mobile computing that I argued was an increased security risk (both data and equipment). Although the class pointed out that security is a major issue for most businesses no matter where their employees are located. As well as, agreeing that an employee could easily take information while at work and sell it to their company’s competitors. However, the reality is that mobile computing put companies at a greater risk of breaches and data theft.

People rely on mobile computing devices for work and personal uses. Laptop computers, Personal Digital Assistants USB memory, smart phones (mobile phones with advanced communication, storage and processing capabilities), iPods, and a variety of wireless accessories have become pervasive in organizations. We prize mobile computing devices for the flexibility and convenience they provide, but mobility presents significant challenges for IT administrators charged with keeping their companies' data and networks secure; particularly as mobile devices and networks have grown more sophisticated and ubiquitous. In addition, the regulatory climate in which companies must operate is placing a greater demand on the control of corporate data.

The data is more at risk because of the portability. Mobile devices are at a greater risk of being stolen because you carry them in more places and they are lightweight. You lose the mobile device, you lose the data. Mobile computing devices contain "lots" of memory (disks and/or RAM), are highly portable and are frequently unprotected: They are relatively easy to steal or lose, and unless precautionary measures are taken, an unauthorized person can gain access to all the information stored inside them. Even if not stolen or lost, intruders can sometimes gain all the access they need if the device is left alone and unprotected, or if data is "sniffed out of the air" during wireless communications. Under some circumstances, wireless mobile devices can be attacked from hundreds of yards to thousands of miles away. The result can be crippled device, one infected with a virus, and/or a device whose data has been invisibly downloaded by an intruder. In the worse case, an intruder can install a spyware program that surreptitiously captures the owner's keystrokes (e.g., credit card numbers, passwords) and other sensitive information.

While these challenges make managing security on mobile devices a trickier proposition, there are ways administrators can help plug the holes that mobile devices have a way of opening in your company's security infrastructure. However, there's no one-size-fits-all solution, and administrators will have to take a long, hard look at each and every user and device accessing corporate data to ensure that all the gaps are filled.

No comments: