Nt1310 Unit 1 Research Paper

Improved Essays
NT1410
Module 5 Exercise 1
Securing Desktop & Mobile Operating Systems
Sierra Baltins
Friday

Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks. These threats can come in many forms, users can get viruses on their computer or an actual person can hack into the user’s account. A user who wants the best protection will need to keep the choice of operating system in mind.
…show more content…
Despite most people’s thoughts, mobile devices may be much more protected than desktops. Anyone using a mobile device can access virus-infected websites and will be just fine. On the other hand, a desktop user accessed a site containing very little threat may still have a high chance ruining their computers.
Similar to the Qubes operating system, mobile devices use sandboxing to isolate the applications. Nobody has user right to any of the mobile applications which also aids the security system. This also disables backward compatibility which is what makes the desktops more prone to cyber-attacks. Although the mobile devices may have a good security system, the operating system the device uses will determine the security features.
I believe that no matter which operating system is used, the user can use dangerous sites without affecting the devices. It’s the application the user may have to be wary of. An iPhone may be a safe option although the user has a limited option of applications to use. Android is a part of Linux meaning that the user will have more access to information Windows and iPhone user may not be able to. Since the user has access to more information, certain applications can also look at private

Related Documents

  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The Notorious B When you walk past the toy aisle at a store what do you see? Usually there are aisles that you look down and see nothing but a sea of pink. Why is this? Why do certain products lean toward certain genders? Companies often do this to target a certain audience and increase sales.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    There are numerous reasons why there is a need for every home cook to own stainless steel bowls. The bowl made from stainless steel has a very durable built and it can even be your partner for a lifetime. These bowls can also keep all your cold items in its cool state as it insulates the items. If you have noticed in parties and social events, there are bowls made from stainless steel used for keeping items such as water, lemonade, soda and others, in order to keep it cool. Placing the bowl on the freezer for only very few minutes will allow it to keep those items placed on it for longer period.…

    • 513 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Task 1 In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system. Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Application / Files sharing between computers Windows Homegroup Windows home networking has been extremely complicated to configure in the past, but Homegroup is easy to set up. Just create a Homegroup from the Homegroup option within Windows Explorer (File Explorer on Windows 8) and you’ll get a password which enables you to access fromyour nearby computers and they can join your Homegroup. The other members of the Homegroup will now have access to your shared files when they log ON to the same network — then you may select the libraries whichever you want to share while you create a Homegroup. Dropbox LAN Sync Many people exchange files between their computers by synchronising them with any one of the cloud storage solutions like Dropbox, Google Drive, or SkyDrive. This can take a while — the file first gets uploaded to your cloud storage provider’s servers and then it gets downloaded back to your other computers.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacterial Methods of Warfare (Geneva Protocol) was penned and signed on 17 June, 1925. This was a treaty signed by the Allies at the close of World War I, which was actually just an extension and re-verification of the Treaty of Versailles (signed in 1919) prior to WWI. The Geneva Protocol furthered the Treaty of Versailles in that it expanded the weapons ban to include a ban on bacteriological warfare. In 1969, this protocol was further expanded to include CS gas agents and harassing agents (probably due to their use by the U.S. during the Vietnam War).…

    • 656 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The hacker can also gain access to the files saved on the hard drive and share them with others in…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Allowing kids under the age of fourteen to play tackle football can have severe consequences to their young minds. I personally do not like football but I’m sure there are other ways that younger kids can play football without tackling each other and getting hurt. “ Goldstein and his colleagues advocate for no tackle football before 14 because children’s bodies, particularly their necks and upper bodies, aren’t strong enough to counteract the bobbling of the head and shaking of the brain that occurs during tackles” (Kounang 1). Not only does that sound painful but why would a parent want that for their child.…

    • 280 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The ConXus Wellness & Benefits Hub provides each participant with a personalized wellness program, benefits information, and the tools for a healthier lifestyle. The white-label portal solution can include themes, logos, colors, and images to support your brand. The personal portal helps every participant succeed by promoting the right tools at the right time based on the user’s health risks, wellness goals, incentives earned, benefits available, and interests. The personal dashboard drives engagement by highlighting key information and next steps.…

    • 434 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Discover our solutions that will allow you to enable display security for your device as much as is possible, whether it is an iPhone, an Android, a tablet or a laptop, and to act efficiently in the event of a problem. However, you have a lot of display security solutions, besides starting with at least an unlock code, which will discourage the majority of attempts to intrude into the system. Device systems are usually designed so that developers build their apps with the default system and file permissions and thus avoid potential security concerns. When using a professional device, beware of downloaded applications. To enable display security for your device in "Android Device Manager," enable or disable "Locate this device remotely" and "Allow remote locking and…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Snap Map Analysis

    • 642 Words
    • 3 Pages

    Smartphones create a “snap map” using our phones and any pictures we post online. These pictures once online can be accessed by anyone with internet access and a device. NBC Action News did a story on how these “snap maps” work and how they can be easily accessed.…

    • 642 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    University of Phoenix Material Communication Process Complete the following table. • Review the steps of the communication model on in Ch. 1 of Business Communication. (See Figure 1.3). • Identify one personal or business communication scenario.…

    • 815 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Magento Case Study

    • 713 Words
    • 3 Pages

    Reasons to hire a Magento development services company Keywords Used- Magento development services Caption- Choose Magento development services for acquiring a promising eCommerce site. Description- Hire a Magento development company that can help in grabbing you higher sales and conversions. There are plenty of options available for creating a website but making a right choice is often one of the most difficult tasks. When it comes to eCommerce, Magento is one of the most preferred shopping cart platform that is mostly preferred by online retailers.…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Also iOS differ from Android OS in that it has a closed OS. Every app to iPhones need to be downloaded directly from the Apple store, which is the app store to iPhones. So developers cannot change structural settings on the iOS. All this things makes the system safer and stable, it is unusual to see crashed apps and system failures such as security breaks. Obviously by not allowing changes in the OS, developers can create apps specifically to iPhones guaranteeing that it will play in every iPhone with the same iOS version.…

    • 825 Words
    • 4 Pages
    Improved Essays