Preview

Case Study Mobile Device Security

Better Essays
Open Document
Open Document
1136 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study Mobile Device Security
Case Study: Mobile Device Security and Other Threats

Yvonne Mitchell
Strayer University Spring 2015
Professor Emmanuel Nyeanchi
Theories of Security Management
May 2015

MOBILE DEVICE SECURITY AND OTHER THREATS
Introduction
There are various security threats for the various mobile devices that we all use on a daily basis. Smartphones are outselling PCs and the lack of adequate security for these devices and other mobile devices leave them vulnerable targets for hackers and other cyber criminals. As the number of attacks increase, the strategies, mitigating solutions and other countermeasures are not keeping up to prevent these attacks. This case study will examine and explore mobile device security and other threats related to computer security.

Analyze the emerging security threats presented within the “Security Threat Report 2014” report. Malware has become an increasing security threat. It is not only a security threat for mobile devices but for PCs also. Those persons responsible for developing and publishing malicious code and websites are getting more and more creative with hiding their criminal activities. Cybercriminals have been studying and researching new ways to hide their identities to avoid being captured and prosecuted. They are utilizing cryptography more and they are placing their servers in closed, anonymous spaces within the World Wide Web to avoid surveillance. As more and more consumers use mobile devices (smartphones, tablets, smart watches, etc.) developers of malware are finding ways to target those devices and web services used on them to conduct their cybercrimes. Users have to be cautious of the applications they use on their mobile devices as well as messages with links that are designed to trick the user into giving criminals access to data on their mobile device. This leads to another security threat, ransomware. Ransomware is a type of malicious software that utilizes a strong encryption that denies user access to files

You May Also Find These Documents Helpful

  • Better Essays

    Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Mobile code refers to interpreted or executable content that can be downloaded and run on a user’s computer. This type of attack offers the user visiting the site a method that’s provide a rich and dynamic content to users.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Securing Mobile Devices. (n.d.). Information Technology - Information Security – Information Assurance | ISACA. Retrieved from http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Securing-Mobile-Devices.aspx…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Cyber space is any area where data and information is electronically stored or filtered through that can be accessed via a variety of networks, programs, and systems. Cyber is all measures put in place to ensure appropriate use and protection for that information. It is important for organizations to ensure their networks and components within those networks are secure. Each connection to the internet, and each user of the network is a vulnerability to that network. In today’s economy with corporate scandals, government crackdowns, financial cutbacks, and new implementation of policy the single most important vulnerability facing IT managers today is the idea of bring your own device (BYOD).…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    References: Milligan, P., & Hutcheson, D. (2008). Business risks and security assessment for mobile devices, Audit and Control Association. www.isaca.org…

    • 610 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    Any device that connects to the Internet is susceptible to mobile malware. Popular games are…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Smart Phone

    • 2740 Words
    • 11 Pages

    --->Just a couple of years ago the biggest software concern we had about our cellphone was whether or not it could play Snakes. Today, smartphones have become a popular target among hackers and malware producers. It is a high-reward business because most people are unaware that their cellphone is just as vulnerable to cyber attacks as their desktop computer. Think about all of the things that you do on your cellphone, and then imagine a worst case scenario we can keep our cellphones, and our data, safe.…

    • 2740 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Malware, Spyware & Adware

    • 2084 Words
    • 9 Pages

    From the early days of cracking passwords and stealing information from personal computers, to deadly Internet based attacks that can shake entire’s nation security, cyber crimes have evolved from the endeavors of entertainment by cyber kiddies to organized crimes and terrorist activities of cyber mafia. Virus Attacks, hacking, browser hijacks, spam, phishing and so on are various manifestations of malicious activities that have evolved on the internet in last couple of decades. Malware is one such tool that has emerged as a widely preferred choice to consummate criminal activities on the Internet.…

    • 2084 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5), 12-14.…

    • 781 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Smartphone’s are extremely popular. Ninety-seven percent of all smartphone users use mobile applications. Fifty-eight percent of those smart phone users use location based applications. There were surveys done by a nonprofit global information security association called…

    • 2082 Words
    • 9 Pages
    Better Essays
  • Better Essays

    May 9, yAs new technology emerges, the Internet evolve and computer network gets bigger and bigger, the need for network security has become one of the most important factors for all organizations and companies to consider (Popescu, 2013). Network security is important for an organization or company’s well being. Increasing network security decreases the change privacy spoofing, identity or information theft. Network security is something that companies should take seriously. An unsecured network system can comprises a company’s files and reputations all at the same time. An organization needs to use a tool that will ensure security efficiency and monitoring. North Shore Medical Research (NSMR)…

    • 1007 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The distribution of mobile malware detected in Q3 2013 by type was similar to that in Q2:…

    • 1404 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Apple’s proprietary operating system such as IOS has limited the kind of application available for Apple users. In fact, the Apple’s system has become less secure because of the growing capabilities of cyber criminals.…

    • 994 Words
    • 4 Pages
    Good Essays