Preview

Security Risk Associated with Mobile Devices

Better Essays
Open Document
Open Document
1441 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Risk Associated with Mobile Devices
Security Risk Associated with Mobile Devices

The term mobile devices are not limited to cellphones; they include iPads, iPods, Laptops, PDAs and e-Readers. These devices act as a lifeline to the outdoor world, and are frequently used for navigating, social networking, shopping, banking and business purposes. What is often forgotten about these devices is that they are gateways to hackers. “Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone,” (Certic, 2013). Mobile Technology became widely accepted by most of the world in the early 1980’s and since then, the evolution of technology has shown substantial growth. “Worldwide smartphone sales reached 144.4 million units in the first quarter, a 45% increase year over year, research firm Gartner reported. Tablet shipments jumped 120%, to 17.4 million units worldwide, according to a report from research company IDC,” (Drew, 2012). In 2013, over 80% of the world’s population uses a mobile phone and to date there are more than 6 billion mobile devices in the world. Concerns regarding cancer in relation to frequent use and security risks associated with the ability to protect the user’s information are controversial.
Today, many people carry mobile phones and portable computers that are substantially much faster than one’s average desktop computer and have the ability to carry much of the same information. These devices have afforded us to remain in touch with colleagues and various people we encounter daily and provide us the opportunity to telework from our homes, thus remaining connected to the internet. With the advancement of technology, we now have the ability to connect and communicate with anyone, anywhere in world. Most mobile devices contain sensitive and highly classified information for some of the most important people and organizations in the



Bibliography: Certic, S. (2013, February 18). The Future of Mobile Security. Computer Science - Cryptography and Security. Drew, J. (2012, August). Managing cyber Security Risk. Journal of Accountncy, 44-48. Friedman, J., & Hoffman, D. V. (2008). Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses. Information Knowledge Systems Management, 159-180. Orman, H. (2013). Did You Want Privacy With That. Personal Data Protection in Mobile Devices, 83-86. doi:10.1109/MIC.2013.48 Phneah, E. (2013, February 4). Five security risk of moving data in BYOD era. Retrieved from BYOD and the Comsumerization of IT: http://www.zdnet.com/five-security-risks-of-moving-data-in-byod-era-7000010665/ Shead, S. (2013, July 17). Most BYOD Businesses Exposing Data to Cyber Criminals. Retrieved from http://www.cio.com/article/736575/Most_BYOD_Businesses_Exposing_Data_to_Cyber_Criminals Sowmya, M. (2011, September 22). Building Cstles in the Sky: Mobile Hacking and it 's Impact on CyberSecurity. Retrieved from Unisys: http://blogs.unisys.com/disruptiveittrends/2011/09/22/building-castles-in-the-sky-mobile-hacking-and-its-impact-on-cybersecurity/ Zhukov, I., Mikhaylov, D., Starikovskiy, A., Kuznetsov, D., Tolstaya, A., & Zuykov, A. (2013). Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals. International Journal of Computer Network and Information Securty, 5(5), 1-8.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Mobile use has become increasingly popular because of the advances in phone, tablet and laptop technology. Kudler Fine Foods must embrace this new technology not only to use it to further their business goals but to also address the security concerns that it poses. Allowing mobile use on the organizational network would mean using wireless connectivity, this opens up the network to a number of threats such as:…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Cyber space is any area where data and information is electronically stored or filtered through that can be accessed via a variety of networks, programs, and systems. Cyber is all measures put in place to ensure appropriate use and protection for that information. It is important for organizations to ensure their networks and components within those networks are secure. Each connection to the internet, and each user of the network is a vulnerability to that network. In today’s economy with corporate scandals, government crackdowns, financial cutbacks, and new implementation of policy the single most important vulnerability facing IT managers today is the idea of bring your own device (BYOD).…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Students, especially college students, are consistently on some type of social media site or on a mobile device that gains them that type of access. There are many varieties of devices such as tablets, smartphones, laptops, and now even smartwatches. Devices such as these are connecting to wireless networks whether it’s from a service provider or campus. With these connections many aren’t just using them for social media, but also for checking grades, schedules, or relevant news. The devices depend on connecting to networks but also need to do so in a secure fashion. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. Many are unaware of the risks that can come from connecting to networks, especially wireless access.…

    • 650 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Mobile computing and social networks are part of the daily lives of millions of Americans. “48% of American adults own a mobile computing device in some form according to the latest Nielsen data.” (Knott, 2012) As far as social networking site usage “over 65% of all internet users in the United States use social networking sites.” (Brenner, 2012) It is obvious that mobile computing and social networking on the web is not a passing fade. There are many uses and applications for mobile computing and social networks. In this paper a few of these aspects will be examined. First an assessment will be made as to the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Second, an evaluation of the benefits realized by consumers because of the ability to gain access to their own data via mobile applications will be completed. Third, the challenges of developing applications that run on mobile devices because of the small screen size will be examined. Forth, the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android will be described. Fifth, due to mobile applications requiring high availability because end users need to have continuous access to IT and IS systems, a discussion of the ways of providing high availability will be undertaken. Finally, because mobile devices are subjected to hacking at a higher rate than non-mobile devices, methods of making mobile devices more secure will be examined.…

    • 3631 Words
    • 15 Pages
    Better Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    National Science Foundation. (2010). Can Clever Hackers Target Smart Phones? Retrieved August 27, 2010, from http://www.nsf.gov/news/news_summ.jsp?cntn_id=116723…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hussein, Handbook of Information Security ( I, 38-64). Hoboken, New Jersey: John Wiley & Sons,…

    • 483 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    In today’s digital world, most Americans leave long electronic trails of private information wherever they go. But too often, that data is compromised. When they shop—whether online or at brick and mortar stores—retailers gain access to their credit card numbers. Medical institutions maintain patient records, which are increasingly electronic. Corporations store copious customer lists and employee Social Security numbers. These types of data frequently get loose. Hackers gain entry to improperly protected networks, thieves steal employee laptops or disgruntled workers pilfer company information.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Communication can be spoken, written and physical; some people have disabilities or difficulties that can make communication a special challenge for them.…

    • 924 Words
    • 4 Pages
    Good Essays
  • Good Essays

    According to 2012 Mobile Growth Statistics there are over 6 Billion mobile subscribers worldwide, which accounts for 87% of the world’s population. Over the past two decades cell phones have come a long way in terms of technology. Cell phones have gone from only being able to make and receive calls to texting and surfing the internet. Millions of people feel that they can’t go a day without their cell phone being in their possession. The effects that mobile technology has on today’s population involves a variety of issues such as weakened bonds between parents and children, the health and wellness of this generation, and vehicle accidents due to cell phone usage.…

    • 548 Words
    • 3 Pages
    Good Essays