Aitoro J R 2009 Cell Phones

Topics: Computer security, Security, Information security Pages: 3 (1279 words) Published: December 3, 2014
Aitoro, J. R. (2009). Cell phones, other wireless devices next big cybersecurity targets. NextGov. Retrieved from http://www.nextgov.com/cybersecurity/2009/06/cell-phones-other-wireless-devices-next-big-cybersecurity-targets/44033/

Clark, R. (2014). Cyber security for smart mobile devices. Control Engineering, 61(8), 32-36. Retrieved from http://www.controleng.com/single-article/cyber-security-for-smart-mobile-devices/00767fbf028f3ac78fd519551fdc4c5e.html

Remote access through these smart mobile devices offers a number of benefits as well as faster answers to events, lower overall costs for operator line hardware, and cheaper travel expenses. These are just some of the important factors that smart mobile device procedure is quickly growing in industrial automation applications. Because this is becoming a more acceptable way of communicating between employees, employers, clients, etc, it is essential that any smart mobile device, whether it be a cell phone, tablet and/or personal computer, that is used for business purposes be controlled through suppliers such as Tofino Security, which assist with automation communications procedures. The scanning of a barcode by a smart mobile device at a machine or a specific location can allow deeper level access by a maintenance person, assisting with keeping a tight control of the information that is being used and shared within that particular mobile device. This particular practice, although burdensome, can help relieve some risk.

Dodd, D. W. (2014). BYOD Changes Everything. College Planning & Management, 17(1), 10-10. Retrieved from http://webcpm.com/articles/2014/01/01/byod-changes-everything.aspx
The article talks about the effect of bringing your own device (BYOD) for educational purposes. It delves into the efficiency of having more mobile-friendly data structures in teaching and learning environments, replacement of institutionally owned personal computers and cyber security. It mentions that cloud-based...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cell Phones Essay
  • Cell Phones Essay
  • cell phone Essay
  • Cell Phones Essay
  • Cell Phone Essay
  • Cell Phones Essay
  • Cell Phones Essay
  • cell phones Essay

Become a StudyMode Member

Sign Up - It's Free