By: Sibbonai Carswell
9/14/2013
RES/531
Mobile phone usage is at its highest right now. I know personally if I don’t have my cell phone I feel like I am missing my closet accessory. I do everything from my phone talk, text. Check email, pay bills, check my bank account, send money, receive money etc. Since so many different things are done on cell phones, mobile security has become a big issue. The subject of mobile computing is extremely important to me because of my background in IT I have a Bachelors Degree in IT as well as I am pursing my masters in Network Engineering. The world has changed significantly in their use of technology a few years back everyone had a laptop and that was the thing to have , now although people still utilize laptops most of everything can be and is done from a cell phone. Now instead of computer hackers that we had to worry about now we have to worry about cell phone hackers. This can be more dangerous than a computer hacker. Why you say?
What is placed on a computer is subjective. Some people use computers for school work and school work only and they do no put any of their personal information on the computer. So there is nothing for a hacker to obtain. However we use our cell phones daily, hourly and sometimes every second. There was a whole write up on the cell phone addiction in a technology magazine I was reading once. So since the cell phone is such a hot commodity and they are so advanced that people use them for everything from paying bills, to talking to loved ones, networking, doing school work and the list goes on and on. Therefore the cell phone is
more susceptible to a hacker because most time it is most valuable due to the ease of use. Why go pull out a laptop or a computer or tablet when you can scroll on your cell phone do and perform every task that can be performed on the larger units. That is the attraction for cell phone users. This is the reason why I
References: http://www.abiresearch.com/press/byod-and-increased-malware-threats-help-driving-bi, BYOD and Increased Malware Threats Help Driving Billion Dollar Mobile Security Services Market in 2013. 2013 www.flexispy.com. Mobile Security.2013 Friedman, J., & Hoffman, D. V. (2008). Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses. Information Knowledge Systems Management, 7(1/2), 159-180. Gelenbe, E., Gorbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M., & Lyberopoulos, G. (2013). Security for Smart Mobile Networks: The NEMESYS Approach. Green, H. (2013). strategies for safeguarding security of mobile computing. Hfm (Healthcare Financial Management), 67(2), 88-94. Mehta, P., & Organero, M. (2009). Study of Security Mechanisms for Secure Mobile Commerce Architecture Through the Development of a Mobile Banking Application. International Review On Computers & Software, 4(1), 1-5. www.mobistealth.com. Mobile Phone security.2013 www.mobispy.com Reed, B. (2007). Expect a rocky road for mobile data security, experts say. Networkworld Asia, 3(11), 10.