Crimeware

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 1 of 1 - About 2 Essays
  • Superior Essays

    Mobile Security Essay

    • 2396 Words
    • 10 Pages

    There are many concerns that can impact a work environment affecting the company, employees, and customers that are faced every day. The damaging implications can arise from security concerns that could lead to theft, identity theft, fraud, and much more. The concerns that may arise when determining the proper security measure to insure in a company can only be beneficial when protecting the company before damage is done. As businesses incorporate a BYOD strategic plan, mobile security becomes even more important. With the power and technological advances of tablets and phones more companies are recognizing their potential to provide a better, faster, and easier work environment. However, as the popularity grows with these devices so does the attempts to hack them. Mobile security is just as important as network security and knowing how to secure a device and threats to look out for can be beneficial to both an employee and a business. Mobile devices are vulnerable to attacks just like a computer. A common attack is malware. Malware, short for malicious software, is software that is designed to damage or do other unwanted actions on a device (Malware n.d). Mobile malware can install spyware, steal data, corrupt data, hijack your phone, text messages, and apps, or encrypt one’s phone for ransom. Business must be wary of infected devices. These devices, when infected, can lead to password leaks, data breaches, blackmail, and back doors into a company’s infrastructure. Mobile…

    • 2396 Words
    • 10 Pages
    Superior Essays
  • Decent Essays

    7) Pirating movies is a big issue today…would viruses on these pirating websites stop you from using these sites? Why? I would stop using pirating websites because the viruses could cause so much damage to my PC. There isn’t anything on the internet that is worth creating that kind of compromise. It can be difficult to discern which sites to trust as we saw in the examples from the case study. 8) What tools would you use to determine if PC had these types of crimeware issues? In addition to…

    • 749 Words
    • 3 Pages
    Decent Essays
  • Previous
    Page 1
    Next