Security And Security: The Importance Of Mobile Phones

Superior Essays
As technologies progress, mobile phones are becoming ordinary in this country and around the globe. The computational influence of these devices endures increasing while, at-the-same time they develop ever lighter and smaller. A new variety of mobile phones and other new products is emerging that combine a range of computational competencies into one physical device. These mobile convergence capabilities enable the user to continue online, retrieving all available data, such as email while traveling. While there are numerous distinct benefits with these new mobile phone devices, they also disturb traditional business developments, and there are security issues that may need to be measured.
Business and organizations needs to be alarmed
…show more content…
Users should never download or accept programs and content from unidentified or un-trusted sources and be cautious when joining to publicly available Wi-Fi hotspots [2]. Do not install illegal or unauthorized applications or software on the mobile cell phone or any other device. Furthermore, backing up cell phones data such as; pictures, music, and other personal files should be considerate [3]. Completely remove all data and settings on one’s cell phone before disposal or handling to a different person such as; a family member or sending to the cell phone provider for repair or replacement.
Equipment loss or theft increases with portability. Cell phones and other devices, because of their portability, is a phone to loss and theft. It is commonly accessible for employees or other users to leave them in buses, planes, taxis and other locations, and it is easy for thieves to swipe them from unsuspecting employees. Portability and mobility increase threats to data protection, it’s easy enough to steal or lose a cell phone device and simply leave it lying around. To prevent and defend against casual data access, all users can implement device lock and pin-based
…show more content…
One way to highlight this need is by preparing employees and providing education and training on cell phone security. It is critical that user and employees gain knowledge concerning mobile device security from global security issues, security threats and attacks, and security countermeasures. These folks would then be better able to address these issues when they become in contact with an issue that involved cell phone security, viruses, protection, and total care. When treated as a pervasive theme, mobile device security issues can be integrated into the entire education and training

Related Documents

  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    What is the problem/hypothesis? Although smartphones provide wonderful advantages and conveniences through services, access to it all requires users to give access to sensitive information to various providers. 10. How does the research fit into the context of its field?…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Cell Phones: An Annotated Bibliography The articles and studies below examine several different aspects pertaining to cell phones. In many of the studies below it can be seen that cell phones are not as private as one would think. With that said one would think that only hackers could evade your privacy true hackers are one, but Law enforcement is the biggest. Does Law Enforcement abide by the law or do they think that they are above the law.…

    • 945 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    1984 Vs Today

    • 451 Words
    • 2 Pages

    Many people have probably heard the phrase “Big Brother is watching you,” though they may not know its origin. It comes from the dystopian novel 1984, by George Orwell. This novel constantly speaks of “Big Brother,” part of the all-seeing government, where there are telescreens in every home and people report any suspicious activity they see. Though published in 1949, many of the things that are going on in that society is happening today. Today’s society and that of 1984 is too similar, and this should be changed.…

    • 451 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Technology is an amazing thing. People are able to check email, video chat, broadcast live video, or order a pizza all from the their phone. The ability to make a phone call from a smartwatch was only something James Bond was able to do, but now anyone can purchase a smartwatch and be just like James Bond. The ability to ask for directions, a phone number, or even the weather forecast, is just the press of a button away. With the amount of tasks that be performed right from a person’s mobile phone, people are more connected today than ever before.…

    • 1017 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    With all of that information in one place, the cell phone has become one of the most targeted devices for cyber-attacks according to the FCC (FCC Cybersecurity). With information changing and being exchanged so fast, it comes down to Cyber Security experts to keep it safe. From the 90’s to now, Cyber Security has evolved with the technology it’s meant to protect. When the World Wide Web was invented, its primary purpose was to make sharing of research between universities and other facilities easier and more reliable (The birth of the web). At the time, the only need for security was who had access to those specific computers.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With the introduction of the iPhone, consumer’s bargaining power will continue to decline. The threat of having an alternative device that is a music player, a phone, a organizer, and mobile is very low. Each additional feature that the iPhone provides is one less opportunity to substitute another device. Computers have many of the features, but aren’t mobile. A PDA is a great device for oranizing schedules and activities, but doesn’t provide the ability to make a phone call.…

    • 701 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Despite Android’s complex and successful system, it has had several flaws in development that need to be addressed. Intrusion detection has been a major factor of consideration as Security evolves to meet a popular demand in privacy. With the popularity of the Android operating system during its early years, an analysis of the system raise Security concerns within the public. With the new mobile markets flooding the industry with popularity, hackers invested in new penetration methods for illegal profit and power. The hackers may abuse certain features of the Android devices such as creating security flaws in the Android operating system, the apps on the Google Play Store, and the contact between the developer and other Android devices.…

    • 822 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Smartphone Privacy Issues

    • 1447 Words
    • 6 Pages

    Smartphones are handheld devices that feature both a telephone and a small computer. Smartphones today have evolved tremendously from just being able to make a phone call. Smartphones are used in many ways such as talking, texting, internet browsing, check your email, taking photos and even making purchases. These small handheld devices are starting to do more and every year. Smartphones are carried around many of users, but most smartphone users aren 't really aware of the privacy issues that comes with being a smartphone owner.…

    • 1447 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Abstract— The focus of this paper is to use Mobile-OTP and QR code in online banking authentication system to provide the best hacker security. Recently, personal information has been leaked through a high degree of methods, such as phishing or pharmacy, to capture user IDs and passwords. This will result in an inappropriate ID / password being propagated between different users; thus a secure user authentication system is essential. In this paper, we use a different technology to provide a secure and easy to use new online banking authentication system Keyword- , OTP, QR code, Android,. I. INTRODUCTION Internet banking is one of the most sensitive tasks that general Internet users perform.…

    • 1446 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    In the United States ninety percent of Americans own a cell phone (“Mobile Technology Fact Sheet”.) Nowadays, Americans use their mobile phones for many things from checking the weather to watch a movie. Cell phones are essential for every day communication and have become one of the top priorities for users. Cell phones are lifesavers and makes life easier.…

    • 879 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Mobile Security Essay

    • 2396 Words
    • 10 Pages

    With the power and technological advances of tablets and phones more companies are recognizing their potential to provide a better, faster, and easier work environment. However, as the popularity grows with these devices so does the attempts to hack them. Mobile security is just as important as network security and knowing how to secure a device and threats to look out for can be beneficial to both an employee and a business. Mobile devices are vulnerable to attacks just like a computer. A common attack is malware.…

    • 2396 Words
    • 10 Pages
    Superior Essays
  • Superior Essays

    Mobile users comprises up a larger portion than desktop users despite generally being seen as less secure platform their desktop counterparts. For this growing group of users, mobile application security is a big concern. It was found that 82% of consumers would change applications if an alternative app was more secure (Arxan Technologies 2016). This is particularly important as there are major vulnerabilities in popular applications that could potentially shift large user bases. In 2014 it was discovered that a majority of popular applications, regardless of paid or free apps, had been hacked, including an alarming 100% of the top 100 paid apps on the Google Android platform (Security Intelligence 2015).…

    • 2164 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Encryption Of Cell Phones

    • 1692 Words
    • 7 Pages

    “One should think, is this safe?” before making any financial transaction on their phone. You should think of the same kind of precautions you make when approaching an automatic teller machine at night. With safety in mind, since the cell phone is now like a computer, it should be protected like a computer. We protect our computer with anti-virus, anti-malware, and anti-spyware software.…

    • 1692 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Smartphone apps stunningly dominate the mobile web time Mobile phones, especially since the era of Smartphone’s have modified the lifestyle and the routine of the people. These touch-enabled devices can assist a person daily in almost all the aspects of life. Right from booking a cab to go to the office in the morning to ordering food in the evening, Smartphone’s are the means that most of them use. Powerful Combo of Smartphone’s and Mobile Apps Smartphone’s have changed the way in which people used to accomplish a task.…

    • 1243 Words
    • 5 Pages
    Improved Essays

Related Topics