Preview

Case Study Mobile Device Security

Better Essays
Open Document
Open Document
1136 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study Mobile Device Security
Case Study: Mobile Device Security and Other Threats

Yvonne Mitchell
Strayer University Spring 2015
Professor Emmanuel Nyeanchi
Theories of Security Management
May 2015

MOBILE DEVICE SECURITY AND OTHER THREATS
Introduction
There are various security threats for the various mobile devices that we all use on a daily basis. Smartphones are outselling PCs and the lack of adequate security for these devices and other mobile devices leave them vulnerable targets for hackers and other cyber criminals. As the number of attacks increase, the strategies, mitigating solutions and other countermeasures are not keeping up to prevent these attacks. This case study will examine and explore mobile device security and other threats related to computer security.

Analyze the emerging security threats presented within the “Security Threat Report 2014” report. Malware has become an increasing security threat. It is not only a security threat for mobile devices but for PCs also. Those persons responsible for developing and publishing malicious code and websites are getting more and more creative with hiding their criminal activities. Cybercriminals have been studying and researching new ways to hide their identities to avoid being captured and prosecuted. They are utilizing cryptography more and they are placing their servers in closed, anonymous spaces within the World Wide Web to avoid surveillance. As more and more consumers use mobile devices (smartphones, tablets, smart watches, etc.) developers of malware are finding ways to target those devices and web services used on them to conduct their cybercrimes. Users have to be cautious of the applications they use on their mobile devices as well as messages with links that are designed to trick the user into giving criminals access to data on their mobile device. This leads to another security threat, ransomware. Ransomware is a type of malicious software that utilizes a strong encryption that denies user access to files

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Mobile code refers to interpreted or executable content that can be downloaded and run on a user’s computer. This type of attack offers the user visiting the site a method that’s provide a rich and dynamic content to users.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CIS 500 Term Papaer

    • 3105 Words
    • 10 Pages

    "Lookout 's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012…

    • 3105 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Some pros to the death penalty are that it protects innocent people and that the death penalty serves as a deterrent. Sentencing convicted murderers with the death penalty we are protecting inmates, guards, and people outside the prison. If we do not sentence convicted murderers with the death penalty and instead sentence them with life we are giving them the opportunity to murder while in prison. A statistic shows that by executing convicted murderers we are saving from three to eighteen innocent lives. The death penalty serves as a deterrent because without the death penalty there would be a lot more murderers. This is so because a lot of people do not commit murder in fear of the death penalty and those who have committed murder would…

    • 138 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Students, especially college students, are consistently on some type of social media site or on a mobile device that gains them that type of access. There are many varieties of devices such as tablets, smartphones, laptops, and now even smartwatches. Devices such as these are connecting to wireless networks whether it’s from a service provider or campus. With these connections many aren’t just using them for social media, but also for checking grades, schedules, or relevant news. The devices depend on connecting to networks but also need to do so in a secure fashion. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. Many are unaware of the risks that can come from connecting to networks, especially wireless access.…

    • 650 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    May 9, yAs new technology emerges, the Internet evolve and computer network gets bigger and bigger, the need for network security has become one of the most important factors for all organizations and companies to consider (Popescu, 2013). Network security is important for an organization or company’s well being. Increasing network security decreases the change privacy spoofing, identity or information theft. Network security is something that companies should take seriously. An unsecured network system can comprises a company’s files and reputations all at the same time. An organization needs to use a tool that will ensure security efficiency and monitoring. North Shore Medical Research (NSMR)…

    • 1007 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    In her essay, One is Not Born a Woman, Monique Wittig explains, “‘Women’ is not each one of us, but the political and ideological formation which negates ‘women’ (the product of a relation of exploitation). ‘Women’ is there to confuse us, to hide the reality ‘women’ . . . For what makes a woman is a specific social relation to a man, a relation that we call servitude.” Monique Wittig attacks the concept of naturalizing biology and the ‘woman’ category. She believes that the form of a woman’s identity is a product of normal and intrinsic human facts. Thus, her main point is that one is not born a woman but becomes a woman based upon the social constructs of gender and sexuality. This analysis serves to expose the holes in Wittig’s arguments, especially her criteria for a sex-less society.…

    • 1409 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    If you thought only home users could get infected by ransomware, think again! Reports have been pouring in from around the world reporting about ransomware infections in courthouses, schools, hospitals and churches in the past month. A few years back it was considered shameful to be admitting about ransomware infections, but now the infections have become more common. More and more institutions are coming out with their experiences as ransomware have increased their encryption capabilities and are really complex.…

    • 265 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The distribution of mobile malware detected in Q3 2013 by type was similar to that in Q2:…

    • 1404 Words
    • 6 Pages
    Powerful Essays