Essay Sample on Fully-Functioning Mobile Apps: The Future of Sales

Paper Type:  Essay
Pages:  7
Wordcount:  1895 Words
Date:  2023-10-22

With the cumulative number of applications for mobile as well as mobile device flexibility, it is now becoming sensible to push on the side of fully functioning applications. This can be done by designing an application of a mobile that will consent the workers to drive the wrapping without carrying the bid laptop. The force of our sales will be more on the use of al applications, versus the plugging in of the laptop (Kaspersky, 2020). Since we have released our apple as well as android products to all the sales teams, we have noticed an increase in morale and sales by 30%. Our company, as well as salesforce leaps, will be boosted by this proposal and bound higher than our competitors.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

The software program is not just the traditional crossing point to the corporate portal; nevertheless, it is a thoroughly efficient invention tool. The name of the application is Pending Approval Production. Despite being among the largest lavender suppliers in the country, it is our aim to lead with innovation and production. Currently, the company is using iPhones and iPad for the force of the sales, and for this reason, it will turn as the first one to field the application for real time test of production. These devices are motorized on data capable, voice, and Verizon services. The company will make use of their network as well as work with many other corporations to aid us in completing this ground opening tool.

Security procedures can be instigated to scramble that data that has been conveyed from mobile devices as well as prevent unauthorized contact to confidential information. Cyber Haven Division of Homeland Security Department concentrates on the internet of mobile infrastructure security via evolving security procedures for the current internet structure such as routers and browsers, fundamentally to regular internet operations for the users not to be redirected to insecure pathways or websites by malicious actors.

The end-user is often the feeblest point in any system. It is not a surprise that the most substantial security's percentage breaches over the recent decades are from the inner part of the organization that is unknown by the user (Kaspersky, 2020). Either via deliberate intent or through careless actions are some of the things that should be put into consideration first and foremost to secure an OS. The application will not allow several issues like an emblematic web-based link to an intramural attendant.

Vulnerabilities or threats to the security network can be generally classified into three groups. These groups include deliberate penetrations, physical attacks, and accidental disclosure. Physical attacks are the risks that are modelled on the environment or corporeal infrastructure, habitually by outsiders. Deliberate penetrations can occur due to active insinuation by insiders and especially those who have the authority to view the confidential data. Accidental disclosure happens because of software and hardware failures, or users' inopportune actions with admittance to safe data. The network procedures that are employed will be used after the application has connected via a VPN connection, and these my include https, sftp, UDP, and FTP. When cooperating as well as working together with our partner corporations to stream images along with merchandise commercials or transmitting a sheet of the sales, having this evidence in the application will change the force of the sales.

Since the stratagems are set with several ways of helping with verification, these methods will be used together with the traditional password. Two verification levels will be used, and these will allow authorized individuals to access the application. The Stratagem will contain a fingerprint and password to access the stratagem set to the manipulator, and the fingerprint will be the primary access, and the pin will be used as a backup. There will be no smart security device that will be changed by the user without the order from the authority. To protected the application, the management does not consent it to be castoff on Wi-Fi unless a manual override is present due to facility issues. The store of the application device will not contain the application upon the proclamation. Still, instead, it will be pushed manually to the Device using the management software because they are the devices for the company.

Application Requirements

The representatives for the sales who will make use of the application, their efficiency as well as production will increase at every site they visit. Having the skills to get all the evidence of the vendor as well as the sales of all products, with an advertisement, it can aid them in marketing as well as showing the transactions that are projected and more (Positive Technologies, 2019). Also, managing to develop new-flagged orders along with product exhibition on the fly is essential since it helps the employees to sell the products along with offering a new comfortable level to the proprietor of the business.

The data received from other corporations are allied to the attendants that will permit inter-connectable maneuvers using numbered interruption from the severance of the server via a major benefactor such as amazon. For cloud stowing backup data along with information argument, this is done via a cloud benefactor agree all the corporations interact, lifting an almanac to the haze as a gridlock to be castoff for this mobile tender. This is more of a scheme of an order that permits the salespeople the maximum control of the transactions they make every day. By the use of this application, the personal data will not overlap with the partner company or any corporate data. The only information that will be allowed by the application to be imported from the Device is contact information as well as geographic location.

Remote connectivity to the components that are vital to the salespeople is done via a virtual private network. It is also initialized as a VPN, and it is a network that is formed on top of the prevailing physical systems, which can offer a secure infrastructures device for data as well as other evidence transferred between a network and a mobile expedient (Positive Technologies, 2019). The VPNs for a device protect the access, sensitive data availability, confidentiality, and integrity and are always connected even though there is a likelihood of the locations and networks to change. Mobile VPNs are different from other VPNs, counting on IPsec VPNs known for connecting fixed endpoints, and secure sockets layer VPNs that are used to connect manipulators to wen browser (Positive Technologies, 2019).

Jailbreaking is the procedure of eradicating the limitations that are caused by the manufacture of the Device. It is generally achieved on Apple iOS diplomacies like the iPad or iPhone. It removes the restrictions Apple that are put in place, and this will allow the attacker to install the software of a third party from outside the application store. Some individuals may have a discernment that jailbreaking can be used for privacy only, which is not the case since it allows the users to perform activities such as changing the default browser of the iPhone as well as an email client. It also will enable users to use software that is not approved by Apple (Karnes, 2020). The difference between the jailbroken as well as non-jailbroken devices is that the user can use the jailbroken Device that is not recommended, but this cannot be the case with non-jailbroken Devices. This has been a challenge to hackers because it becomes hard for their mission to get fulfilled. With jailbroken Device, it is easy to change the default browser with the browser cannot be altered in non-jailbroken Device.

Threats

Regardless of how secure a system can be, vulnerabilities with equipment and software can never lack. Remaining proactive in this tactic with patches and system maintenance is the best way to protect the application from known threats. Threats agents have identified various risks associated with this application, and they can be categorized into two groups. These include human interaction as well as automated programs.

There are several chances left in the hands of the users by human interaction, and some of the issues may arise because of these errors. Some of the issues that are most likely to occur include Stolen Device User. This is the user who obtains unauthorized contact with the Device intending to get the memory-related delicate data that belong to the Device's owner. Once the application remains inactive for more than five consecutive minutes, the phone will automatically lock, and it will request for fingerprint for it to proceed.

Another issue is the Device's owner. This refers to the user who unwillingly connected a malevolent application for the phone that allows access to the bid memory device. This feature may not affect the company's maneuvers since mobile Iron applications are accomplished by the phone, which incapacitates the utilization of the unapproved App, hence pushing all needed packages to the Device.

Organization Internal Staffs. These are the users who are working in the organization. They can also be described as any person with privileges to carry an action using the application. There are insufficient rights granted to some administrators that require approval by more administrators, and two groups must authenticate.

Automated programs are also among the threats in this application, but they do not need much collaboration from the user. These may include a malware on the mobile. This is any mobile or program application that completes mistrustful activities. It may be an application for lifting real-time information from the Device of the operator and transfer it to some of the servers (Lookout, Inc, n.d). This kind of database implements analogous to all the running progressions in the foundation and remains alive, taking malicious duties all the time. It can as well giveaway text messages as well as glancing history. We have selected all diplomacies to be work devices plus rule has been laid to limit custom to preapproved locations sales demonstrative would merchant websites, directive sheets, visit, and many more. Another issue that may be included here is malicious short message service (SMS). It is an incoming message that is readdressed to prompt any type of apprehensive action on the Device. These are numerous services that keep on moving in the contextual. All these amenities have auditors, and they might be attentive to content listening to the SMS that is coming. Malicious App is another problem in automated programs. This is the failure to detect vulnerable or malicious code as well as the compromise likelihood or attack in contradiction of the store of the App itself, theoretically turning authentic cryptogram into antagonistic things comprising new transferred apps and updates. Since the application hoard will be restricted to the App that is not an approved App, this will not be much essential, because all needed applications will be moved to all devices and updates.

Methods of Attack

Spoofing, in this case, implies to trick or imitate someone. For an individual to get a real understanding of the spoofing attack, there is a need of examining the structure of the IP sachet in aspect. Several cyber-attacks begin from designing defects in the ultimate designs of the network, and therefore, you cannot use except packet spoofing. The IP address is created by the hacker targeting the location; nevertheless, the source IP base is reformed to hind the processor of the hacker, and the same processor may be used to collect statistics or sniffer through the person who is hacking the system.

Cite this page

Essay Sample on Fully-Functioning Mobile Apps: The Future of Sales. (2023, Oct 22). Retrieved from https://proessays.net/essays/essay-sample-on-fully-functioning-mobile-apps-the-future-of-sales

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism