Encryption Of Cell Phones

Improved Essays
As technology has evolved to make things easier for the user to have what they need, often times it is those intuitive technological features that make our personal information vulnerable to hackers. Cell phones are a perfect example because they were originally invented to be used for both formal and informal communication. Cell phones functionality has expanded to the point where it encompasses almost the same functionality as computers. As a result of this increased functionality, cell phones have a lot of important data stored on them. We all are acutely aware that we have to protect our personal data from viruses and hackers on computers; however, have we placed the same importance on protecting the personal data on our cell phones. …show more content…
Users like having the ability to access and use applications at a moment’s notice. This means there will be more passwords and personal identifiable information stored on the phones. Encryption of website and / or an application is helpful for increasing safety. A user should use a secure close network when surfing the internet if possible. When a cell phone user is reaching out via Wi-Fi network it can be unsafe, ex. a free coffee shop network. Those Wi-Fi networks are open playgrounds and opportune times for thieves to snatch your information. When not using Wi-Fi on your phone, turn it off to be more secure and save battery life. Smarter cell phone security is the way. So the question is how to be smarter with our phones? The first step in being smarter with our phones is to know where it is physically located at all times. The size of the cell phone has changed since its beginning and the sizing trend is growing to have a bigger screen. This means it will stop fitting your jean pockets and will need to be in a purse/bag or in a case on your hip. Most likely a chain will not come into fashion to tether the phone. So after each use one needs to be cognitive of where you put it and not leave it on a table. Pay attention where you last laid the phone …show more content…
One can check your balance of your accounts, pay bills, and transfer funds. Now at a business you can go up to a register and wave your cell phone at a kiosk and pay the bill. Some businesses use their cell phone as the register and use an attachment to swipe your credit card. If thieves intercept or steal this information, they can ruin your financial status. This data needs to be protected. “One should think, is this safe?” before making any financial transaction on their phone. You should think of the same kind of precautions you make when approaching an automatic teller machine at night. With safety in mind, since the cell phone is now like a computer, it should be protected like a computer. We protect our computer with anti-virus, anti-malware, and anti-spyware software. The software helps make our computers run efficiently by providing updates for different hardware and software. Our data is vulnerable without it. We are sending documents from our cell phones to our computers and back. 360 Security, Avast!, Trend Micro and McAfee are some company names that have made software to protect cell phone data in the same way. Most of these companies have free versions and paid versions. Out of date software and applications is like having an open safe. Updating and protecting the operating system and applications is vital to having your cell phone working properly and aid to keep your data

Related Documents

  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Cell Phones: An Annotated Bibliography The articles and studies below examine several different aspects pertaining to cell phones. In many of the studies below it can be seen that cell phones are not as private as one would think. With that said one would think that only hackers could evade your privacy true hackers are one, but Law enforcement is the biggest. Does Law Enforcement abide by the law or do they think that they are above the law.…

    • 945 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Mariner 10 History

    • 503 Words
    • 3 Pages

    Having looked at Mariner 10’s mission to Mercury last time around, we will be continuing with firsts this time as well... but firsts that are closer to home. In fact, we will be looking at the first portable handset and the first ever cell phone call that was made… things that are part of our everyday lives now! Martin ‘Marty’ Cooper, regarded by many as the father of cellular phone, graduated from the Illinois Institute of Technology (IIT) in Chicago with a bachelor’s degree in electrical engineering. After a stint with the U.S. Navy, Marty joined Motorola in 1954 and earned his master’s from IIT in 1957. It is important to recall that the idea of a mobile phone was already afloat during this time.…

    • 503 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    4. Protect your cellular devices. You have a more improved identity robber protection if you protected your cellular devices. You can do this by using anti-spyware or anti-virus software.…

    • 694 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Smartphones are a mobile personal computer with Swiss army knife capability. The majority of smartphone users places their lives in their phones storing personal information such as photos, memos, emails, health data, and private conversations. Such a powerful and expensive device made it a target for thieves. Many iPhones were stolen, and so was the personal information of the owners. How did the thieves unlock the phone to get the information?…

    • 2128 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    A cell phone is a very convenient device, but people use it in…

    • 650 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Competition is rising in the mobile industry, causing phone companies to constantly be creating and releasing new phones. They are sold to us as though we absolutely need it in our lives or else we are not taking full advantage of what is available to us. These phones are made to give us the most possibilities in something that can fit in our pocket. Before all we needed was a four coded password or a word coded password to get into our phones. Then we were given the option of having our finger prints to open up our phones.…

    • 1466 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    As a society, we are beginning to the face-to-face contact that was such an important part of our lives in the past. Besides having lots of benefits, mobile technology also have some of the negative points. These days people get so addicted to mobile phones for talking, messaging, videos, games, etc. that they overlook the actual purpose of the phone and squander large part of their time in needless interaction over the phones.…

    • 885 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Apple Vs Fbi Case

    • 1417 Words
    • 6 Pages

    One’s phone contains their very personal information including their love life, fantasy, medical record, bank and financial records, digital key to their car and house, or garage door. This information must be protected, and one should have control over their personal information. What if the information was not protected, everyone including law enforcement agency has all the information, and they can monitor every move; how would be the life then? According to Ashkan Soltani, an engineer spoke with the Guardian, “Just imagine what it would look like if every smart device you own could be used against you. You are suspected of a crime.…

    • 1417 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Executive summary With the change in economic environment, technology is also changing. In the recent few years, the number of smart phone users has increased rapidly. The Smartphone has created a different image in the minds of people and became a part of their life. The Smartphone is not only the mode of communication, but also best medium of entertainment. Its different qualities and features have made it popular worldwide.…

    • 3878 Words
    • 16 Pages
    Improved Essays
  • Great Essays

    Remote lock for andriod smartphone Manjiri M. Bole, Yogini S. Chavan, Arif J. Shaikh, Saurabh D. Chikhale Computer Department, K.J.C.O.E.M.R Computer Department, K.J.C.O.E.M.R Computer Department, K.J.C.O.E.M.R Computer Department, K.J.C.O.E.M.R. Abstract — In this paper, we propose a MAC-based remote lock and wipe system through the SMS push notification to protect against the private data disclosure when smart phone is lost or stolen. The proposed system provides the integrity checking mechanism so that the malicious users are unable to launch denialof- service attacks which send the lock or wipe commands to the normal users on purpose. Also, it satisfies the SMS length limitation of 80 bytes long without downgrading the security level.…

    • 2041 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    Mobbo Secuirty Case Study

    • 727 Words
    • 3 Pages

    Backup your Contacts You can take a backup or you contacts and store it to some other place so if you lose any of then you can restore than from our application easily. 5. Take…

    • 727 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Introduction The following analysis will analyze the cell phone industry with a focus in the smart phone industry which has been at a steady growth since the early 2000s. This analysis will cover the markets served, the industry demographics, and the historical perspective on the smart phone industry. With the cell phone industry being one of the fastest growing industries in the world, a large market share is available for different competitors to compete with one or another. Products Offered Almost everybody in the world has heart of a cell phone and today, even most people know what a smart phone is.…

    • 1471 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Also iOS differ from Android OS in that it has a closed OS. Every app to iPhones need to be downloaded directly from the Apple store, which is the app store to iPhones. So developers cannot change structural settings on the iOS. All this things makes the system safer and stable, it is unusual to see crashed apps and system failures such as security breaks. Obviously by not allowing changes in the OS, developers can create apps specifically to iPhones guaranteeing that it will play in every iPhone with the same iOS version.…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nowadays, technology develops better and better. Some people can 't even live without a mobile device for a day. Right now, people all use their phone to make the social communication, they use the phone to make a call, to text, to go to Facebook, Instagram and all the social media apps. Mobile phone become a part of peopl 's basic life. But if we don 't find a right way to use the phone, it will bring negative effect to our daily life.…

    • 774 Words
    • 4 Pages
    Improved Essays

Related Topics