This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

IMPACT OF MOBILE DEVICES ON CYBERSECURITY

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Impact of mobile devices on cybersecurity

Arabo, A., & Pranggono, B. (2013, May). Mobile malware and smart device security: Trends, challenges, and solutions.

The authors of this article focus on research the challenges and trends of cybersecurity. These devices offer more features and functionality. Mobile malware is marked as a critical issue which is expected to increase and become more advanced in the years to come. They also propose integrated solutions for cybersecurity in smart devices to tackle the problem. Malware has become popular due to the increased computational powers of intelligent devices, the growing use of rooted devices on both Android and iPhone, and the lack of awareness on the user’s end. The authors also describe how the ubiquity of smartphones enhances malware development. The authors, Arabo and Pranggono work for Oxford internet institute, Oxford University and School of Engineering and Built Environment, Glasgow Caledonian University respectively. The article was published in 2013 and is therefore reliable. Relevant to cybersecurity, the report focuses on the vulnerability of smart devices to the rising development of malware and the challenges faced in restraining different types of malware.

Khan, J., Abbas, H., & Al-Muhtadi, J., (2015). Survey on Mobile User’s Data Privacy Threats and Defense Mechanisms. Procedia Computer Science, 56, 376-383.

In a survey on mobile user’s data privacy threats and defense mechanisms, the authors focus on the reliable protection and restriction of malicious activity by application developers, device manufacturers, or application stores. Because of vulnerabilities and threats, data protection is a dangerous task. Some key points are put in place to ensure mobile security and protect data privacy from various threats. The regulations include preventing the user from using non recommended applications and using biometric features for authentication of real mobile users. The authors also discuss the mechanisms used in securing personal business related data and other information in devices. The article is credible because the authors, Jalaluddin Khan, Haider Abbas, and Jalal Al Muhtadi all work for the Centre of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia. Haider Abbas is affiliated with the National University of Sciences and Technology, Islamabad Pakistan. Besides it, was written in the year 2015 and is therefore up to date. It is relevant to the topic as it emphasizes the protection of data and restricts malware.

Leavitt, N., (2011). Mobile security: finally, a serious problem? Computer, 44(6), 11-14.

Neal Leavitt talks of how mobile phones are targets for hackers to attack due to sensitive transactions such as mobile payments, banking, and transmitting confidential data. Hacking activities occur since smartphones generally connect to the internet for software updates and media synchronization. There is rapid adoption to both Android and iPhones, making it hard for enterprises to manage. Visible mobile threats that have risen over the years include phishing, spam, viruses, and malicious downloadable applications. Leavitt discusses how botnets, Wi-Fi, spyware, social media, malicious apps, and Bluetooth can be used to hack mobile devices and how most can be remedied. Neal Leavitt is a humanities lecturer at the college of general studies, and most of his research is centered on human rights. Published in 2011, the article is reliable and relevant to the topic of discussion in that it highlights how easily hacking activities in smartphones occur. He also mentions how some of these hacking techniques can be curbed.

Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A. (2015). A Review of Bring Your Own Device on Security Issues.

A review of bringing your device on security issues, the authors opine that the policy of allowing the employees to bring their own mobile devices to work is called Bring Your Own Devices (BYOD). Security threats posed by this policy include data leakages, distributed denial of service, and malware for the company PCs. In this case, data leakage occurs in various forms such as remote access of mobile device by the attacker, the malicious user of mobile device, application vulnerability, and Trojan attacks on social media apps, email, and SMS. The authors of this article, Morufu Olalere, Mohd Taufik Abdullah, Ramlan Mahmod, and Azizol Abdullah are all affiliated with the Information Security Research Group, Faculty of Computer Science and Information Technology. This article is therefore credible and reliable as it was published in 2015. In addition, the material is relevant to cybersecurity as it highlights the dangers of data leakages from the users’ mobile devices and the vulnerability of personal computers to Trojan attacks.

Wright, J., Dawson Jr, M. E., & Omar, M. Cyber security and mobile threats: the need for antivirus applications for smart phones.

The authors emphasize the need for modern security software for smartphone devices. Malicious cyber attackers are notorious for hacking devices due to lack of security. Availability of information is the leading cause of cyber-attacks with threats ranging from Trojans and viruses to toolkits and botnets. Most of the security software found in personal computers such as antivirus and firewall are unavailable for smartphone devices. Smartphones are more vulnerable, as they are committed to performing more individual tasks. The convenience of using smartphones to access social media, download apps, and conduct monetary transactions is then loopholed many attackers use to access personal information. Jorja Wright, Maurice Dawson Jr and Marwan Omar work for the Florida Institute of technology, Alabama A&M University and Colorado technical university respectively. The article is updated; it was published in the year 2012 and is therefore reliable. In relevance to cybersecurity, the article focuses on the vulnerability of smartphones to cyber-attack threats and the need for smartphone antivirus to manage these threats.

 

References

Arabo, A., & Pranggono, B. (2013, May). Mobile malware and smart device security: Trends, challenges and solutions. In 2013 19th international conference on control systems and computer science (pp. 526-531). IEEE.

Khan, J., Abbas, H., & Al-Muhtadia, J., (2015). Survey on Mobile User’s Data Privacy Threats and Defense Mechanisms. Procedia Computer Science, 56, 376-383.

Leavitt, N., (2011). Mobile security: finally, a serious problem?. Computer, 44(6), 11-14.

Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A. (2015). A Review of Bring Your Own Device on Security Issues.

Wright, J., Dawson, Jr, M. E., & Omar, M. (2012). Cyber security and mobile threats: The need for antivirus applications for smart phones. Journal of Information Systems Technology and Planning, 5(14), 40-60.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask