Curriculum
Course: Foundation Year - Qualifi Level 3 Diplom...
Login
Text lesson

Unit CSM03: Mobile Device and Data Risks

Unit code: J/617/1166

RQF level: 3

Aim

Mobile devices pose a significant threat to an organisation’s state of cyber security. The number of smartphone users is around 2.5 billion at time of writing. On any single day, hundreds of millions of employees travel and commute and are mobile-enabled in terms of conducting their business and exposing valuable data to enhanced risk.  In this unit the learner will learn how mobile devices become attached to radio and telecommunications networks. How are they connected to the internet and what types of tool can be utilised by malicious attackers to harm individuals and business organisations?  The second half of this unit will introduce and explain significant favoured ways by the cyber security and mobile device industry used to protect mobile devices and data. Key approaches and tools such as data encryption, storage back-up, and other security measures will be investigated and recommended.  Moreover, Cisco estimates that 50 billion items will be connected to the internet by 2020. The Internet of Things (IoT) are cyber-enabled gadgets and devices – often used for leisure or household purposes – that unintentionally expose our home or business networks to additional risk because they become attached to the very same communications channels and signals. In response, malicious hackers are developing customised malware to attack such devices. What are the IoT vulnerabilities and how can they be patched or remediated, if at all? Analysis or consideration of the IoT will therefore form an important part of this unit. A range of case studies for business and public sector/government organisations will be used throughout this unit.

Learning Outcomes and Assessment Criteria 

Learning Outcomes. To achieve this unit a learner must be able to: Assessment Criteria: Assessment of these outcomes demonstrates a learner can:
1 Understand how mobile smartphones and the Internet of Things communicate and the associated risks 

1.1 Explain mobile smartphone vulnerabilities and the associated risks

1.2 Explain vulnerabilities of the Internet of Things and the associated risks of these device connections and signals

2 Understand risks posed by malware and mobile apps 2.1 Assess how various types of malware and monitoring (sniffing) devices can connect with mobile device/s 
3 Understand commonly recommended mobile device protection methods advocated by the tech industry 

3.1 Explain mobile device security solutions that are suitable and tailored to different types of user and business environment 

3.2 Recommend Mobile Device Management (MDM) within organisational information security plans, as part of ISO27001 compliance 

Layer 1