3.6 STEP 6: Control Recommendations After compiling the different levels of risk for AT&T’s smart technology, it is easy to say there are many flaws in AT&T’s mobile network databases. Below are some key recommendations for AT&T to use in order to improve their security posture and mitigation of threats on their networks. Compatible Applications: As described before, AT&T’s smart technology is compatible with many different applications, like Google and Mozilla. These applications require some type of internet connection that the customer needs for daily use. WiFi hotspots are key to the establishment of such connections. One recommendation to ensure safety of a customer’s mobile device is to disable the Wi-Fi and continuously harden the mobile device platform with security patches, when not in use. This method will help protect personal and business information on the mobile device. Databases: In mobile based platforms, database systems are crucial to the management of data that the …show more content…
Fiber, 3G, and 4G LTE transmission mediums are all capable of providing more secure means of data transportation. As described above, some security flaws that are present within transmission mediums include exploiting unused ports, cross-site request forgery, and remote code execution. A recommendation to help mitigate these security flaws is to deploy local and global traffic management solutions along with firewalls (F5, 2016). This will help improve AT&T’s security as well enable easy scalability of their mobile networks. Another recommendation for the security flaws mentioned before is the installation of SSL encryption and decryption endpoint sensors to secure connections between devices (F5, 2016). This will help mitigate threats at the point of entry or exit during the transmission of data on AT&T’s mobile