Top-Rated Free Essay
Preview

Fire Truck Crash

Satisfactory Essays
318 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Fire Truck Crash
Mobile Device Protection The consequences of losing a smartphone or other mobile device are significant because these devices store personal and business data. The goal, therefore, for mobile devices users is to make their data as secure as possible. Techniques include avoiding unsafe links, using caution when downloading apps, turning off GPS tracking, and installing mobile security software. A high percentage of users follow unknown links, which can lead to a malicious website. Malicious links can inject malware on a mobile device. The malware may steal personal information or create toll fraud, which secretly contacts wireless messaging services that impose steep fees on a monthly bill
. Users should avoid tapping or clicking unknown links. Any device that connects to the Internet is susceptible to mobile malware. Popular games are likely candidates to house malware, and often is difficult to distinguish the legitimate apps from fake apps. Users should check the reliability of the seller, the descriptions and reviews of the apps, and the requested permissions before downloading. GPS technology can track the mobile device’s location as long as it is transmitting and receiving
Signals to and from satellites. Although this feature may be helpful, serious privacy concerns can arise
When the technology is used in malicious ways, such as to stalk individuals or trace their whereabouts
. It is best to keep this feature disabled until needed. Users can enable the password feature on their mobile devices as the first step in stopping prying eyes from viewing contents. More protection is necessary, however, to stop viruses and spyware and to safeguard personal and business data. Mobile security apps can lock a mobile device remotely, erase its memory, and activate its GPS function Some techniques users can take to protect mobile devices include avoiding unsafe links, using caution when downloading, turning off GPS tracking, and using mobile security software. Users should take these measures to protect their mobile devices.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lack of Physical Security Controls – primary mitigation strategies are encrypting the client device’s storage or not storing sensitive data on the client device…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    If someone told you “You are being watched every time you use digital communications, “how would you feel? The majority of people would probably feel discomfort. Sadly, you are being watched by the National Security Agency or NSA. While they allegedly keep us safe, the NSA shouldn't continue to monitor everyone’s digital communications. It gets every tax paying citizens money involved. They violate an amendment of the constitution. Likewise, there is a major loss of privacy. They simply have access to too much information. (Pathos)…

    • 1052 Words
    • 5 Pages
    Good Essays
  • Best Essays

    The number of mobile applications is expected to reach $75B with 70% of the applications geared towards smart phones (Joseph, 2009). Not only are commercial, civic and private organizations utilizing this technology, armatures worldwide have also engaged this technology adding thousands of other unique applications to the thousands currently available. Organizations whether they are civic, commercial or private must join the mobile revolution to remain competitive and relevant.…

    • 3576 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    CIS 500 Term Papaer

    • 3105 Words
    • 10 Pages

    "Lookout 's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012…

    • 3105 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Cell phones have become the leading source of communication in the world. However, it is not just phone calls or e-mails anymore, someone might take down time to play angry birds or candy crush saga. If your cell phone is left on and completely unattended someone, knows your location. Over 200 million Americans who own a cell phone have been watched on a data base created by the cell phone company, keeping track of tower signals, recording conversations, and making copies of text messages and emails. Even the United States government has gone to the extent to using cell phone information when coming to court evidence and alibies. Parents are becoming technologically aware and are using tracking abilities to keep an eye on their children and their whereabouts. The question remains, where can you draw the line between…

    • 718 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Week 10 Term Paper

    • 3259 Words
    • 10 Pages

    In this term paper, I will assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to processing server without users having to use a desktop system. Next, I will evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Following the examination the challenges of developing applications that run on mobile devices because of the small screen size. Then I will describe the methods that can be used to decide which platform to support. Afterward I will discuss ways of providing high availability given that a mobile application requires high availability because of end users needing to have continuous access to IT and IS systems. Last but not least, I will discuss methods of making mobile devices more secure, since mobile devices are subjected to hacking at a higher rate than non-mobile devices.…

    • 3259 Words
    • 10 Pages
    Better Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Good Essays

    With this new technology we are capable of spying on people, finding people, tapping phone…

    • 625 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Privacy is a way to be able to have an individual expression within ourselves. It has been a long argument and controversy stating that the citizens of this country are having their privacy invaded through any technology source. There has been many inquiry investigations and theories relating to this specific topic. In the novel 1984 by George Orwell he gives a prediction of how our thoughts and ways to communicate freely will be invaded by spurious idols to scare the people to consume all the false information. There has been more reliable sources anyone can turn to, such as “That’s no phone. That’s my tracker” by Peter Maass and Megha Rajagopalan talk about how our source of technology can be a way to track and follow us every step we go,…

    • 797 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    What happens if we lose our phone? Day to day life is so heavily reliant on phones and electronics that are becoming harder to perform seemingly simple tasks without them.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Social Security

    • 707 Words
    • 3 Pages

    "What your cell phone could tell about you might astound you. Cell phones store many different kinds of information. Personal details, the photos and files you choose to put into your phone, and text messages you have sent received are obvious examples. However, global positioning system (GPS) information will also tell others where your phone is and, therefore, where you are likely to be, or even where you might be going. The call data in your phone shows what calls you made and received, while your phone book shows the people you know and gives their phone numbers. In short, your cell phone is a mobile encyclopedia- about you!" Stated by Debra Wu in Source 2. Nowadays everything is about technology but it is it really safe to be giving…

    • 707 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Technology is a magnificent thing. A majority of people use some form of technology on a daily basis such as their telephones, computers, tablets, and even many devices on their cars. Many of these things are a necessity for a person to have daily, especially if they have to use these devices for work and/or school. Technology also helps people communicate with other people all over the world. Although, technology is a wonderful thing, how private is our information? And, when is it okay for the government to gather this information on specific citizens without their consent, even…

    • 1433 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Good Essays

    government tracking

    • 1009 Words
    • 5 Pages

    Do you know who is tracking your movements when your turn on your cell phone, or what is being done with that information? These are questions that I recently had to ask myself after reading two insightful articles. The first was by Ronald Bailey called “Your Cellphone is Spying on You” and the other was by Terry J. Allen entitled “Reach Out and Track Someone”. In Ronald Bailey’s article, he explores the use of cellular phone tracking technology by law enforcement and their recent attempts to expand the surveillance laws to include more use of cell phones to track users’ movements without their knowledge. In addition he gives us some perspective on the idea of a big brother watching over us by examining what a future built on limited privacy expectations might look like. Allen gives us his personal perspective on tracking technology and explores abuses that might arise if we continue down the current path. Both of these articles have given me insight into the use of tracking technology and make me question both the moral and legal ramifications of sharing information related to personal movement. There is in fact a moral and legal balance that satisfies the need to protect the privacy of law abiding citizens, prosecute criminals, and protect family and friends through the use of cell phone tracking all at the same time, and the name we give to that solution is the constitution.…

    • 1009 Words
    • 5 Pages
    Good Essays