Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Security risk associated with mobile devices
Don’t take our word for it - see why 10 million students trust us with their essay needs.
With the increasingly ubiquitous nature of mobile devices and online availability, including smartphones and tablets, there is also an understandable concern about the level of security that is afforded to such devices. This can be considered as increasingly important given the proliferation of policies such as BYOD (Bring Your Own Device) which is being used by diverse organizations as a way of lowering the cost of ownership for such devices while also leveraging the flexibility advantages that their utilization can bring. It is therefore an area of immense interest due to the changing and emerging nature of both the technology itself as well as the security concerns.
Due to the sensitive and confidential information that would exist on such devices, it is imperative that security solutions and processes are implemented in order to protect and secure such content from the proliferation of threats and vulnerabilities which can affect mobile devices (Juniper Networks, n.d.).
Mobile devices are being exposed to a record number of security threats with potentially alarming statistics indicating a 400 percent increase in Android malware for example, while Wi-Fi connections are also being increasingly targeted. While the conventional desktop PC will still continue to serve important functions at both consumer and professional levels, there is an expectation that mobile devices will become the predominant form for accessing both personal and professional content it is understandable that cyber criminals have begun focusing on mobile devices which have at the same time grown their user base while substantially consolidating the operating system variants which makes the surface area for a potential attack substantially larger (...
... middle of paper ...
...com/icloud/find-my-iphone.html
http://www.google.com/android/devicemanager
Sujithra, M., & Padmavathi, G. (2012). Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. International Journal of Computer Applications.
Sujithra, M., & Padmavathi, G. (2012). Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. International Journal of Computer Applications.
Abendan, G. (2013, August 8). Exploiting Vulnerabilities: The Other Side of Mobile Threats. Retrieved from Trend Micro: http://blog.trendmicro.com/trendlabs-security-intelligence/exploiting-vulnerabilities-the-other-side-of-mobile-threats/
Wright, J. (2014). Five Wireless Threats You May Not Know. Retrieved from SANS: http://www.sans.edu/research/security-laboratory/article/wireless-security-1
Kotapati, K., Liu, P., Sun, Y., & LaPorta, T. F. (2005). A taxonomy of cyber attacks on 3G networks. In Intelligence and Security Informatics (pp. 631-633). Retrieved November 11, 2013 from http://nsrc.cse.psu.edu/tech_report/NAS-TR-0021-2005.pdf
There is constant concern about different kinds of devices and tools because of their vulnerability: laptops; personal computers in the home; libraries and public workstations; USB Flash Drives and email, to name a few. These items are easily accessible for those attempting to breach security.... ... middle of paper ... ...
Works Cited for: Caplan, Hayley. How to Avoid Cell Phone Identity Theft? What Is Privacy? N.p., 31 July 2012. Web.
So keeping in mind the increased availability and accessibility of smartphones worldwide, the proposed solution would be to create an application that will gather data about OSA risks through surveys.
As we progress deeper into the digital era, we rely more and more on our electronic devices. Over the last decade, almost everyone who lives in a developed nation owns a cellphone and they are becoming an integral part of our life.
In this case study, I aim to present the recent issue about Cyber security, protecting client’s private data and information through the controversial Apple and
recent years. Number of smartphone users passed 1 billion in 2012 and is predicted to increase by next billion within less than three years. This increasing trend of using mobile device h...
The International Telecommunications Union estimates there are 6.8 billion mobile subscriptions worldwide (mobiThinking). The growth of mobile computing in both the workforce and for personal use has also caused a growth in the malware and mobile botnets available to mobile devices (Symantec). To be able to properly protect the mobile device and environment, security teams should be looking at building in and not just bolting on security mechanisms. It is a fairly common saying now among security professionals that it is not if you are hacked or breached it is a matter of when. However, by using common sense and choosing methods that offer a better defense strategy, users and security organizations can minimize or greatly reduce the likelihood of sensitive data loss.
doi:10.1007/s13347-011-0040-9. Vacca, W. A. & Co., Inc. a. The adage of the adage of the adage of the adage of the adage of the Military culture and cyber security. Survival, 53(6), 159-176. doi:10.1080/00396338.2011.636520.
I will be searching about the Security Risks of Mobile Phones, Expanding on them, how they affect us and what we can do to prevent them. “About 75 percent of the world has Mobile Phones”. I will be searching how it affects their everyday life. I will also talk about different Mobile Phones and what kind of risks they contain. It is a Vast and broad topic which requires a lot of Research. I will be searching different sites to make sure that I have
As designers, developers and sellers of a wide range of consumer electronics and computer hardware and software, Apple is constantly releasing the “next best thing” and making a hefty profit off of it. While Apple thrives on being a technological leader, the company prides itself on several other characteristics. The security and privacy of its consumers is one of Apple’s main priorities, and this
In the study of [5] – A study of Android Application Security, by William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri have used four approaches to evaluate the source codes of several Android applications in order to identify the security failures in the application [5]:
Recent years raised concerns whether connecting our e-mail and bank account to our mobile phones is really secure. Cord (2014) points out privacy as the biggest issue of mobile phone industry and calls for openness and honesty since data tracking is becoming a common phenomenon. A radio cloud network introduces security solutions for the next-generation breaches.
Gralla, Preston. "Smartphone Apps: Is Your Privacy Protected?" Computerworld. N.p., 7 July 2011. Web. 22 Apr. 2014.
This paper is going to discuss wireless security from a broad view where I will go into why wireless security is so important, especially today as the ways in which we communicate is changing dramatically. From there I will discuss the multiple wireless security options that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally, I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden. Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked to a wireless network or even through your phone through a 3G or 4G network to connect to an open wireless network.