IT Examiner School, Providence, RI

Understanding future IT security developments (Cont.)

 Current vulnerabilities in current mobile computing technology (continued)  Unauthorized access to sensitive/proprietary data  Elevated risk of use of unauthorized software  Loss of data due to greater difficulty in making backups  Mobile devices used without owners’ knowledge  Interception of clear text communications  Non-secure email  Vulnerabilities in wireless networks and protocols (including encryption protocols)

Copyright 2010 Emagined Security – All Rights Reserved :-

Conclusion

 Payment volumes are rising and becoming more electronic

 Mobile is exploding, mobile payments are still in their infancy, and terminology remains unclear

 Banks are the biggest threat to mobile payments adoption because of their focus on fees

 Mobile RDC may actually slow the decline of check usage in the P2P, P2b market

Made with FlippingBook Annual report