Mobile Application Security: Security And Complications Of Mobile Security

Superior Essays
Mobile users comprises up a larger portion than desktop users despite generally being seen as less secure platform their desktop counterparts. For this growing group of users, mobile application security is a big concern. It was found that 82% of consumers would change applications if an alternative app was more secure (Arxan Technologies 2016). This is particularly important as there are major vulnerabilities in popular applications that could potentially shift large user bases. In 2014 it was discovered that a majority of popular applications, regardless of paid or free apps, had been hacked, including an alarming 100% of the top 100 paid apps on the Google Android platform (Security Intelligence 2015). Mobile platforms are generally regarded …show more content…
About 50% of organizations have no resources allocated towards mobile security and around half feel that their app will be hacked within the next 6 months (Arxan Technologies 2016). And although budgets for security are increasing in general, the feeling is that it is still not enough to create a formidable security solution. Organizations also feel that the use of mobile applications has increased their security risks by a very significant amount. These vulnerabilities can lead to major implications such as data breaches and loss of consumer information which as seen in the Target and Home Depot examples, can be very expensive.

As a whole mobile security presents a significant risk and we have already seen major vulnerabilities in major applications. These trends are expected to continue and emphasize the need for better processes and standards for the entire industry.

3. Potential Impacts of
…show more content…
This is obviously very potentially costly, but many developers are beginning to feel comfortable rolling the dice and instead choosing to make an appropriate response whenever a breach occurs. The explosion of growth for mobile applications has led to organizations rushing to get applications to market. They are prioritizing other activities such as marketing and developing a userbase prior to implementing security. What is security good for if there is nothing to protect it? The belief, particularly for young companies and startups, is that limited resources would be served better developing the application and if the application fails that the additional funds spent on security were worthless and could have been put to better use in marketing or

Related Documents

  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    What is the problem/hypothesis? Although smartphones provide wonderful advantages and conveniences through services, access to it all requires users to give access to sensitive information to various providers. 10. How does the research fit into the context of its field?…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    When regarding the security of information, Tim Cook’s belief is that, “[c]ompromising the security of our personal information can ultimately put our personal safety at risk”. That is why encryption has become so important to all of us”. Cook reminds us that not everyone in the world lives without the intent to harm others and as a result, security should be a more important issue. In a world where technology continues to become a more integrated aspect of life, society should worry about the people who can misuse it for their personal…

    • 1482 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Apple Vs. FBI In today 's generation, many adults and teenagers keep everything from contact numbers to their social security numbers on their smartphones. When customers, including criminals and terrorists purchase their smartphones, they are buying it with the assurance that not some, but all of their information and privacy will be safeguarded. The issue occurring today deals with the suspected terrorist of the San Bernardino, California on December 2, 2015 shooting involving over 30 injured people.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    1984 Vs Today

    • 451 Words
    • 2 Pages

    Many people have probably heard the phrase “Big Brother is watching you,” though they may not know its origin. It comes from the dystopian novel 1984, by George Orwell. This novel constantly speaks of “Big Brother,” part of the all-seeing government, where there are telescreens in every home and people report any suspicious activity they see. Though published in 1949, many of the things that are going on in that society is happening today. Today’s society and that of 1984 is too similar, and this should be changed.…

    • 451 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Final Exam More than 700 million Iphones have been sold globally in 2015 (Costello). Iphones contain an unbelievable amount of personal information. From financial information, to emails, texts, photos, and passwords; imagine all that information being easily accessible to anyone. The FBI is currently trying to convince Apple to give them a “backdoor” to a particular phone. What the FBI fails to realize is how dangerous this could be for anyone else.…

    • 327 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Federal law enforcement does the best job possible protecting American citizens. However, they occasionally will infringe on the civil rights of their citizens in their pursuit of this protection. Louis Brandies address this concern in his dissenting opinion in the Olmstead case: "The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding." In the fight between Apple and federal law enforcement over a locked iPhone, the government is violating Apple’s Constitutional rights by asking for backdoor encryption software to their devices. If Apple allows the government to succeed without fighting back, it will open the floodgates for the government to encroach on Americans citizens and…

    • 2128 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    Many users are concerned that the smart devices are listening in on their conversations and are transmitting their data to ‘Big Brother’ to monitor our lives. Consumers fear that law enforcement, the government, and companies are listening…

    • 1186 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Information Security Breach these days has been a popular subject in news. Almost every companies have been hacked, if not yet, they should not consider themselves as more secure than others that have already been there. In December 2013, Target was one of the victims with more than 40 million credit cards and debit cards that were stolen by malicious people. Just right before Thanksgiving a malware was installed inside target database.…

    • 1715 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays