Security Risk Associated with Mobile Devices
The term mobile devices are not limited to cellphones; they include iPads, iPods, Laptops, PDAs and e-Readers. These devices act as a lifeline to the outdoor world, and are frequently used for navigating, social networking, shopping, banking and business purposes. What is often forgotten about these devices is that they are gateways to hackers. “Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone,” (Certic, 2013). Mobile Technology became widely accepted by most of the world in the early 1980’s and since then, the evolution of technology has shown substantial growth. “Worldwide smartphone sales reached 144.4 million units in the first quarter, a 45% increase year over year, research firm Gartner reported. Tablet shipments jumped 120%, to 17.4 million units worldwide, according to a report from research company IDC,” (Drew, 2012). In 2013, over 80% of the world’s population uses a mobile phone and to date there are more than 6 billion mobile devices in the world. Concerns regarding cancer in relation to frequent use and security risks associated with the ability to protect the user’s information are controversial. Today, many people carry mobile phones and portable computers that are substantially much faster than one’s average desktop computer and have the ability to carry much of the same information. These devices have afforded us to remain in touch with colleagues and various people we encounter daily and provide us the opportunity to telework from our homes, thus remaining connected to the internet. With the advancement of technology, we now have the ability to connect and communicate with anyone, anywhere in world. Most mobile devices contain sensitive and highly classified information for some of the most important people and organizations in the...
Bibliography: Certic, S. (2013, February 18). The Future of Mobile Security. Computer Science - Cryptography and Security.
Drew, J. (2012, August). Managing cyber Security Risk. Journal of Accountncy, 44-48.
Friedman, J., & Hoffman, D. V. (2008). Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses. Information Knowledge Systems Management, 159-180.
Orman, H. (2013). Did You Want Privacy With That. Personal Data Protection in Mobile Devices, 83-86. doi:10.1109/MIC.2013.48
Phneah, E. (2013, February 4). Five security risk of moving data in BYOD era. Retrieved from BYOD and the Comsumerization of IT: http://www.zdnet.com/five-security-risks-of-moving-data-in-byod-era-7000010665/
Shead, S. (2013, July 17). Most BYOD Businesses Exposing Data to Cyber Criminals. Retrieved from http://www.cio.com/article/736575/Most_BYOD_Businesses_Exposing_Data_to_Cyber_Criminals
Sowmya, M. (2011, September 22). Building Cstles in the Sky: Mobile Hacking and it 's Impact on CyberSecurity. Retrieved from Unisys: http://blogs.unisys.com/disruptiveittrends/2011/09/22/building-castles-in-the-sky-mobile-hacking-and-its-impact-on-cybersecurity/
Zhukov, I., Mikhaylov, D., Starikovskiy, A., Kuznetsov, D., Tolstaya, A., & Zuykov, A. (2013). Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals. International Journal of Computer Network and Information Securty, 5(5), 1-8.
Please join StudyMode to read the full document