Preview

Mobile Devices Security

Satisfactory Essays
Open Document
Open Document
280 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mobile Devices Security
Mobile Devices Security
This is my Summary for mobile devices security. I think that mobile computing devices have become a critical tool in today’s networked world. Enterprise and individuals alike rely on mobile devices to remain reachable when away from the office or home. While mobile devices such as smartphones, laptops personal digital assistants PDAs and universal serial bus USB memory sticks have increased convince as well as productivity in the workplace these befits are not without risks.
Mobile devices have been, and continue to be a source of security incidents. These stem from issues such as device loss malware and external breaches. As the availability of human resources and systems continues to be critical to society and business operations, it stands to reason that mobile device usage will continue to escalate as will the features this device offer. It is therefore imperative that proper risk management be applied and security controls implemented, to maximize the benefits while minimizing the risks associated with such devices.
I think that mobile devices are easy to hack and therefor need more security because say if you have your ipad or cell phone a criminal can easily gain access to your device just buy guessing your ip address or guess the right code for your security key.
I think that will not be good for mobile devices because if you have a cell phone and you are trying to keep all of your personal data on the device the criminals will have easy access and take your personal data and use it to gain a credit card or try to get you in trouble with the law and that you do not

You May Also Find These Documents Helpful

  • Powerful Essays

    Task 3

    • 4254 Words
    • 17 Pages

    Complete a thorough analysis of the mobile device policies. Periodically examine mobile device usage and identify security risks/threat.…

    • 4254 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    Cyber space is any area where data and information is electronically stored or filtered through that can be accessed via a variety of networks, programs, and systems. Cyber is all measures put in place to ensure appropriate use and protection for that information. It is important for organizations to ensure their networks and components within those networks are secure. Each connection to the internet, and each user of the network is a vulnerability to that network. In today’s economy with corporate scandals, government crackdowns, financial cutbacks, and new implementation of policy the single most important vulnerability facing IT managers today is the idea of bring your own device (BYOD).…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    com worksheet

    • 544 Words
    • 3 Pages

    Match the communication theories with their descriptions by placing the letter of the description in the blank.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cell Phone Privacy

    • 655 Words
    • 3 Pages

    A. Whenever you use your cell phone, you are being tracked. Whether you are using an app or connecting to Wi-Fi, your phone company knows where you are and what you are doing.…

    • 655 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ever since the introduction of the first mobile computer device, there has been a growing need and want for more and more mobile computing devices. Once users got the first taste of harnessing the power of the mobile device that was all they needed. Today, you cannot walk down any public road or walk into a public building without seeing users talking and connecting to the internet via mobile devices.…

    • 3826 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Mobile based applications provide a wealth of information to the end user and businesses alike. Users on the go can download and upload information effortlessly…

    • 3631 Words
    • 15 Pages
    Better Essays
  • Good Essays

    cell phone privacy

    • 814 Words
    • 4 Pages

    Secondly, GPS tracking is the biggest invasion of privacy on cell phones. This has increased through many court cases in the past years. “’ Awareness that the Government may be watching chills associational and expressive freedoms,’ wrote U.S. Supreme Court Justice Sonia Sotomayor in U.S. v. Jones, a 2012 case dealing with warrantless GPS tracking” (Bailey). This is a big issue because it was warrantless, and that is what many of the American people have a problem with. If there was a device that would be created to track your movements and find information about an individual, it would look very similar to a cell phone (Calabresi, Rogers, and Thornton). That cell phone has…

    • 814 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Essay On Ehlers Danlos

    • 601 Words
    • 3 Pages

    If you regularly dislocate your joints, you may have Ehlers-Danlos syndrome, which is a group of connective tissue disorders that are caused by the disruption of the integrity of collagen. Ehlers-Danlos is not rare, but it is rarely diagnosed. While there is no cure, there are treatments that can help alleviate your symptoms. Here's what you need to know.…

    • 601 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Securing Mobile Devices. (n.d.). Information Technology - Information Security – Information Assurance | ISACA. Retrieved from http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Securing-Mobile-Devices.aspx…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Technology is rapidly growing and offers a vast amount of benefits for children and young people. This ever growing development however also poses risks for children and young people and they need to know how to protect themselves. The various risks of mobile phones and being online can be; exposure to inappropriate content, cyber bullying, grooming for paedophiles, disclosure of personal information, piracy or illegal downloads and viruses or hacking.…

    • 1373 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    References: Milligan, P., & Hutcheson, D. (2008). Business risks and security assessment for mobile devices, Audit and Control Association. www.isaca.org…

    • 610 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Mobile Phone

    • 608 Words
    • 3 Pages

    It is clear that mobile phones are an invasion of privacy as they can be hacked, giving criminals access to your data which increasingly is coming to contain financial access data such as credit card numbers, bank account numbers and etc. It is also possible for criminals to “clone” phones, or for them to steal your phone and modify the chip, allowing your details to be used outside your network area. Hackers are now seeing these devices as a new way of making money, a new way of getting data about people. The cell phone hacker can even access your camera phone and speaker, to keep track of your every move.…

    • 608 Words
    • 3 Pages
    Good Essays