Annotated Bibliography: Mobile Telecommunications

Improved Essays
Annotated Bibliography: Mobile Telecommunications in the U.S.
Kenny Anyikude
March 16, 2017
Bowie State University

In the area of mobile telecommunications, I’ve discovered growth trends, which will have an impact on the development of the telecommunications industry. These trends will impact the present and future development of mobile telecommunications. Security threats have become a growing trend; cybercriminals have evolved into new and dangerous forms to stay relevant (Olavsrud, 2015). Another trend I have come across is power line networking, which is wired network with hidden wires (Evans, 2014). Also, Internet of things is also a growing area in mobile telecommunications (Johnson, 2015).

Olavsrud, T. (2015, December 21). 5 information security trends that will dominate 2016. Retrieved March 19, 2017, from http://www.cio.com/article/3016791/security/5-information-security-trends-that-will-dominate-2016.html
…show more content…
The author emphasizes the need for companies to broaden their risk management approach to withstand negative outcomes of cyberspace. In addition to, the author depicts five important trends that must be understood in order to combat security threats: 1.The unintended consequences of state intervention 2. Big data will lead to big problems 3. Mobile applications and IoT 4. Cybercrime causes the perfect threat storm 5. Skills gap becomes an abyss for information security. To conclude, the author depicts the challenges that companies should be aware of in defending against growing cyber

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Cell Phones: An Annotated Bibliography The articles and studies below examine several different aspects pertaining to cell phones. In many of the studies below it can be seen that cell phones are not as private as one would think. With that said one would think that only hackers could evade your privacy true hackers are one, but Law enforcement is the biggest. Does Law Enforcement abide by the law or do they think that they are above the law.…

    • 945 Words
    • 4 Pages
    Decent Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    China uses cybersecurity as a one-step process of clearing any doubt concerning the safety and security in management of organizations. China regards the innate definition of cybersecurity as a system of management that offers maximum security within the confines of the internet. The author of the article has used a practical example of the varied developments that have taken the country to greater heights of GDP and economic growth of the individual people. He cites cybersecurity as a force that has brought such changes. The author of the article concludes by stating that cybersecurity is a relevant information system that offers security to every confidential docket within an…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Cybersecurity Policy Paper

    • 1062 Words
    • 5 Pages

    Introduction In today’s technological society it is very important that organizations maintain strong security policy documentation. The most important documentation that should be maintained is the cybersecurity policy. In this paper I will discuss the cybersecurity policy of the organization I have chosen (Apple INC). This paper will supply an analysis of the strategy that they use to protected themselves against fraud, hackers and theft.…

    • 1062 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Thesis: Security is a big concern as hackers have reasons to obtain personal data for monetary gain. Network security risks are increasing and becoming more complex, resulting in many obstructions for information systems specialists. Security threats appear to accompany every new technology invented. I. Security Policy Guidelines Policies are considered highest level of documentation, from which the other major standards, procedures, and guidelines run. Security policy changes over time, and there is a policy life-cycle.…

    • 942 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity In America

    • 899 Words
    • 4 Pages

    United States cybersecurity is arguably as important, if not more so, than the US Military. The private sector, civilian businesses and personnel, lost more than $1 trillion in 2008 as a result of cyberattacks. The $4.5 million Predator military drone, had its camera feed hacked by a $26 dollar piece of software widely available on the Internet (Marshall,1). Neither the government nor the private sector is immune to security breaches, but which group is better equipped to protect America’s interests?…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Cyberattacks have become one of the biggest threats facing the United States today. Although Bill Clinton, George Bush, and President Obama have passed laws and put forward executive orders; cybercrime is still a prominent threat to our country. Obama further extended Bush’s Patriot Act through executive orders, improving the security to sixteen sectors by providing more in order to prevent future breaches and threats. Cybersecurity has become a prominent issue in politics and how our government reacts to cyber threats. The stakeholders from a political lens focus on how cybersecurity affects our government.…

    • 293 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    In the earliest communities, people were “Hunter-Gatherers”. This means, in most instances, men would hunt animals to eat, and women would gather fruits and vegetables. During this time people Nomads; they moved to new locations based upon the flocking patterns of the animals they hunted. After this, they learned that they could capture and breed the animals we ate. This is when the hunter-gatherer phases ended and the horticultural phase end.…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Cyber Attacks And Hacking

    • 969 Words
    • 4 Pages

    Teaching "hacking" as a legitimate means of training students in how to protect a future employer 's data assets have been introduced into courses with increasing frequency. This requires building a cyber-army to use when needed to stay on top of the game and stay ahead of the competitors: Russian, Chinese, and Iranian. Army May Create Cyber Career Field for Civilians on the “army.mil” website, an official U.S. military website, report that the better marketing, attractive bonuses, and repayment of student loans might attract more cyber civilian workforce. (Vergun). The cyber security market is growing rapidly because of the increase in adoption of cyber security solutions, due to the increase in security breaches targeting enterprises.…

    • 969 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Cybersecurity Case Study

    • 1801 Words
    • 8 Pages

    As Bayuk location 387 (2012) points out, on-going communication and cooperation between the public and the private sectors will lead to a more resilient national cyber standing. As it stands today, data on cyber breaches and vulnerabilities are kept confidential and locked away. Not realizing how vulnerable various sectors are keeps managers in the dark about the threats facing their enterprise. Bayuk further emphasizes the need for closer collaboration…

    • 1801 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Network security has been at the head of some stories in the news. Security is an aspect of the technology field that should be considered at all times. Not only can personal security be breached, the security of others can be affected as well. For example, the incident with the retail company Target, (Vijayan 2014) retailer 's failure to properly segregate systems handling sensitive payment card data from the rest of its network. In this paper, network segment security aspects will be discussed on why they are important, who can be affected, and what can you as a someone entering the Information Technology field do to make yourself an asset which will help your placement and skills while working.…

    • 862 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    The continual evolution of the phone has redesigned technology in the time frame of one hundred and forty years through improvements that both benefit and hinder society. Despite the fact that the phone was invented over one hundred and forty…

    • 1015 Words
    • 5 Pages
    Improved Essays