Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Security risk associated with mobile devices
Impact of mobile computing on businesses
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Security risk associated with mobile devices
The Impact of Mobile Devices on Cyber security:
The modern society including corporate environments has been characterized by the proliferation of mobile devices. The increased use of these devices is attributed to the significant opportunities they bring and their contribution towards enhanced communication. However, the increased use of mobile devices has been accompanied by considerable concerns regarding the privacy of personal information and sensitive corporate data that are stored on them. In essence, mobile devices have significant impacts on cyber-security because the type of data stored and accessed on the devices contributes to heightened security risks. Despite the significant benefits associated with the increased use of mobile devices, they generate new cyber security issues including heightened financial risks, loss of company data, and non-compliance issues.
Increased Use of Mobile Devices:
Mobile devices have become attractive platforms for communication in today’s society to an extent that they are increasingly used for storing and accessing personal information as well as company data. The increased use of the devices has been enhanced by the adoption of near field communication for mobile payment services, particularly in business. As a result, people and businesses not only rely on these devices for communication purposes but also use them for monetary services. Actually, it is estimated that the use of mobile devices will continue to grow in the future for various purposes.
However, the increased use of the devices is also accompanied by significant cyber security threats because of the type of information stored on and accessed from the devices. Generally, the increased use of mobile devices in th...
... middle of paper ...
...ams are repackaged in a way that it is almost impossible for the average users of mobile devices to regain control of the system or data once the attack has been carried out.
Conclusion:
The increased use of mobile devices in today’s society has contributed to numerous benefits in terms of communication and improved working environments. However, this trend has been accompanied by huge concerns because of the impact of the use of mobile devices on cyber security. Despite the significant benefits associated with the increased use of mobile devices, they generate new cyber security issues including heightened financial risks, loss of company data, and non-compliance issues. The three major ways with which these devices increase cyber security issues include sophistication of cyber attacks, connectivity to corporate networks, and lack of awareness and carelessness.
In this section we investigate attacks and threats to our primary devices. These attacks and threats are built off of the vulnerabilities the previous section and help to determine which security controls would be most valuable against future attacks.
There is constant concern about different kinds of devices and tools because of their vulnerability: laptops; personal computers in the home; libraries and public workstations; USB Flash Drives and email, to name a few. These items are easily accessible for those attempting to breach security.... ... middle of paper ... ...
For most people, not having a cell phone is unimaginable and without one we feel disconnected from the world. The leading device that helps us survive and navigate through this current hi-tech world is the Apple iPhone. With features like 3G network capability and remote database access it offers full computer functionality in the palm of a hand. Besides voice calls and text messages, the iPhone allows for full web browsing, email, and allows the installation of applications to further enhance usability through its own AppStore. But what if one wanted to push the iPhone’s capabilities beyond the limit of what Apple is willing to provide? The answer can be found in our other world, the cyber-world.
As we progress deeper into the digital era, we rely more and more on our electronic devices. Over the last decade, almost everyone who lives in a developed nation owns a cellphone and they are becoming an integral part of our life.
As we can see now-a-days, there are many replacements to card payments such as MOBILE PAYMENT options like Apple and Samsung Pay. Recently, Apple has launched finger print (TOUCH ID) payment option in its new Mac-book Pro. Almost every application has its own wallet to pay. But still, as we know that technology is any day not secured. It might not be vulnerable today. But, we cannot predict its non-vulnerability because one day or the other, it becomes vulnerable to any type of attack.
In this case study, I aim to present the recent issue about Cyber security, protecting client’s private data and information through the controversial Apple and
They have asked us to build a backdoor to the iPhone.” [6]. Since the FBI vs Apple case, regarding the complexity of the encryption Apple uses for its devices, encryption backdoors have been a hot topic. Apple argues that having one defeats the purpose of the encryption, making it easier to access and exploit data [7(a)]. Having encryption and firewalls brings peace of mind but vigilance, constant upkeep, and caution on the users end are also required for network security.
Many people in today’s society rely on technology to help us with our daily lives and help us stay connected to family, friends, and other people. The advancements in today’s cell phone technology is very complex and made to be efficient for their owners, allowing them to surf the net and IM message people instantly. Cellphones in particular have developed very fast in the past 15 years. From my childhood, cell phones have evolved from the old school Nokia bricks that allowed texts, calls, and simple graphic games, to todays I-Phones that have higher computable capabilities than some computers. In the United States alone, there is an estimated population of around 297 million people, and 197 million people are subscribed to cell phone companies (Starr). With so many people in today’s society with so much power and opportunity in the palm of their hands, we shouldn’t forget that “With great power comes great responsibility” –Voltaire.
With the increasingly ubiquitous nature of mobile devices and online availability, including smartphones and tablets, there is also an understandable concern about the level of security that is afforded to such devices. This can be considered as increasingly important given the proliferation of policies such as BYOD (Bring Your Own Device) which are being used by diverse organizations as a way of lowering the cost of ownership for such devices while also leveraging the flexibility advantages that their utilization can bring. It is therefore an area of immense interest due to the changing and emerging nature of both the technology itself as well as the security concerns. Due to the sensitive and confidential information that would exist on such devices, it is imperative that security solutions and processes are implemented in order to protect and secure such content from the proliferation of threats and vulnerabilities which can affect mobile devices (Juniper Networks, n.d.). Mobile devices are being exposed to a record number of security threats, with potentially alarming statistics indicating a 400 percent increase in Android malware, for example, while Wi-Fi connections are also being increasingly targeted.
E-Commerce is a type of industry where the buying and selling of products or services is conducted over electronic systems such as the Internet and other computer networks. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. It also includes ‘M-commerce’ which makes use of various mobile devices or smart phones. It means "the delivery of e-commerce capabilities directly into the consumer’s hand, anywhere, via wireless technology.” The various services available on M-Commerce are Mobile Money Transfer, Mobile ATM, Mobile ticketing, Mobile vouchers, coupons and loyalty cards, News, Stock Quotes, shopping apps, Mobile brokerage etc. Launching of Google Wallet Mobile App is one of the recent developments.
I will be searching about the Security Risks of Mobile Phones, Expanding on them, how they affect us and what we can do to prevent them. “About 75 percent of the world has Mobile Phones”. I will be searching how it affects their everyday life. I will also talk about different Mobile Phones and what kind of risks they contain. It is a Vast and broad topic which requires a lot of Research. I will be searching different sites to make sure that I have
In today’s world, a Smartphone has become essential part of daily life. There was a time when transactions happened through barter system. Thereafter was the emergence of notes and coins. And presently, the world is moving towards the “Digital Wallet”. Due to technology, mobile users can use their Smartphone to make money transactions or payments by using applications installed in their phone. Digital wallet system is an essential part of electronic commerce. E-commerce provides the capability of trading on the internet. A digital wallet is a virtual service used as a substitute for physical cash. The present study tries to study the various factors that can affect a consumer’s
This paper is going to discuss wireless security from a broad view where I will go into why wireless security is so important, especially today as the ways in which we communicate is changing dramatically. From there I will discuss the multiple wireless security options that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally, I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden. Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked to a wireless network or even through your phone through a 3G or 4G network to connect to an open wireless network.
The world today is a result of centuries of evolution; one of the major adaptations is technology, specifically the invention of the smartphone. The smartphone is a cellular phone that has the capabilities of performing similar functions to that of a computer (Oxford Dictionaries’ online dictionary, n.d.). The smartphone is owned by youth for the most part; however, adults and seniors are also turning toward using this device. This in turn demonstrates the popularity of this marvelous device, and is the reason why it is constantly monitored by its users. The continuous evolving of the populations' wants and needs such as communication, searching of information, entertainment and recording, makes owning a smartphone essential, and beneficial as it is portable, reliable and efficient.
In today’s society technology is used for everything. With the invention of computers and the internet this open doors to the cyber world. Today you can do almost anything without having to leave your home. The internet gives us the opportunity of shopping online, ordering food online, working from home and video chatting with friends and family across the world. Everyone has a computer and internet access in their homes. While the internet is really convenient it also opens doors for cybercrimes, loss of privacy and the need for computer security.