Preview

Mobile Security Research Paper

Powerful Essays
Open Document
Open Document
2517 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mobile Security Research Paper
Final Term Paper : Mobile Security
By: Sibbonai Carswell
9/14/2013
RES/531

Mobile phone usage is at its highest right now. I know personally if I don’t have my cell phone I feel like I am missing my closet accessory. I do everything from my phone talk, text. Check email, pay bills, check my bank account, send money, receive money etc. Since so many different things are done on cell phones, mobile security has become a big issue. The subject of mobile computing is extremely important to me because of my background in IT I have a Bachelors Degree in IT as well as I am pursing my masters in Network Engineering. The world has changed significantly in their use of technology a few years back everyone had a laptop and that was the thing to have , now although people still utilize laptops most of everything can be and is done from a cell phone. Now instead of computer hackers that we had to worry about now we have to worry about cell phone hackers. This can be more dangerous than a computer hacker. Why you say?
What is placed on a computer is subjective. Some people use computers for school work and school work only and they do no put any of their personal information on the computer. So there is nothing for a hacker to obtain. However we use our cell phones daily, hourly and sometimes every second. There was a whole write up on the cell phone addiction in a technology magazine I was reading once. So since the cell phone is such a hot commodity and they are so advanced that people use them for everything from paying bills, to talking to loved ones, networking, doing school work and the list goes on and on. Therefore the cell phone is

more susceptible to a hacker because most time it is most valuable due to the ease of use. Why go pull out a laptop or a computer or tablet when you can scroll on your cell phone do and perform every task that can be performed on the larger units. That is the attraction for cell phone users. This is the reason why I



References: http://www.abiresearch.com/press/byod-and-increased-malware-threats-help-driving-bi, BYOD and Increased Malware Threats Help Driving Billion Dollar Mobile Security Services Market in 2013. 2013 www.flexispy.com. Mobile Security.2013 Friedman, J., & Hoffman, D. V. (2008). Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses. Information Knowledge Systems Management, 7(1/2), 159-180. Gelenbe, E., Gorbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M., & Lyberopoulos, G. (2013). Security for Smart Mobile Networks: The NEMESYS Approach. Green, H. (2013). strategies for safeguarding security of mobile computing. Hfm (Healthcare Financial Management), 67(2), 88-94. Mehta, P., & Organero, M. (2009). Study of Security Mechanisms for Secure Mobile Commerce Architecture Through the Development of a Mobile Banking Application. International Review On Computers & Software, 4(1), 1-5. www.mobistealth.com. Mobile Phone security.2013 www.mobispy.com Reed, B. (2007). Expect a rocky road for mobile data security, experts say. Networkworld Asia, 3(11), 10.

You May Also Find These Documents Helpful

  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cyber space is any area where data and information is electronically stored or filtered through that can be accessed via a variety of networks, programs, and systems. Cyber is all measures put in place to ensure appropriate use and protection for that information. It is important for organizations to ensure their networks and components within those networks are secure. Each connection to the internet, and each user of the network is a vulnerability to that network. In today’s economy with corporate scandals, government crackdowns, financial cutbacks, and new implementation of policy the single most important vulnerability facing IT managers today is the idea of bring your own device (BYOD).…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    There are many threats a network faces when the IT department allows students to connect to the network or Internet using mobile devices. Some threats affect the campus network only, while other threats directly affect students or employees. For the campus network, threats include…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Bibliography: Kim, David and Michael G. Solomon. “Fundamentals of Information Systems Security.”, 15-42. Sunbury, MA: jones and Bartlett Learning, 2012.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Interpretive Essay

    • 487 Words
    • 2 Pages

    A Man for All Seasons, by Robert Bolt illustrates the adult life of Sir Thomas More. In this play, the Common Man portrays man and his vices and sins showing the ordinary man of every age, class, culture, and society. Bolt uses the Common Man in the roles of the steward, boatman, and jailor to show how man can easily sin. Common Man exhibits man’s immorality through the roles of the steward, boatman, and jailor, in A Man for All Seasons.…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Securing Mobile Devices. (n.d.). Information Technology - Information Security – Information Assurance | ISACA. Retrieved from http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Securing-Mobile-Devices.aspx…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    On the Black Tuesday, the stock market crashed and marked the beginning of the United States’ most severe economic downturn — the Great Depression. During this dark period, millions of people lost their jobs and thousands of families depended on the "bread line" to survive. In contrast to the former President Hoover who did "too little, too late", the newly elected President, Franklin D. Roosevelt, started the New Deal. The New Deal is defined as a government-regulated economy, with experimental projects all designed to help lessen the effects of the depression and to take American economy into a healthier position. The three main aspects that the Great Depression affected drastically were the banking and financial system, the unemployment…

    • 973 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Wireless Security

    • 3481 Words
    • 14 Pages

    The purpose of the study was to assist in the decision whether Lotus Development should extend current security policies to encompass wireless devices. The following are critical security questions:…

    • 3481 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Mobile Computing

    • 1913 Words
    • 8 Pages

    Brady, James., Sadler, Connie J., Finney, Shannon., Oakes, Reid., Seymour, Dennis M., & Woods, Beau (November 11, 2011). Security of Mobile Computing Devices in the Healthcare Environment. Retrieved from http://www.himss.org/content/files/PrivacySecurity/HIMSS_Mobility_Security_in_Healthcare_Final.pdf…

    • 1913 Words
    • 8 Pages
    Powerful Essays

Related Topics