Portable Mobile Devices I E Smart Research Paper

Download this Research Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Research Paper:

As most users, are averaging about three hours a day conducting a wide variety activities. It is at this point that hackers can be able to penetrate these vulnerabilities to use them as a backdoor inside a company's database. Once this occurs, is when there is the possibility that the situation will become worse as more criminals will utilize this as an easy way to overcome the challenges of going directly after a firm's initial blocks. This is important, because it is showing how there are increased vulnerabilities that these phones have due to the lack of effective security. (Coleman, 2011)

To make matters worse, many firms have begun using cloud computing as way to store large amounts of information. This is when they have significant pieces data on an organization's mainframe. The reason why, is because these kinds of computers have become more powerful and cheaper. This is allowing a variety of firms to be able to reduce costs and increase the total amounts of storage that they have available. The problem is that this kind of security procedure is giving hackers the ability to overcome traditional defenses. Part of the reason for this, is because a number of security experts have been advising their clients about how their current strategy can deal with any kind of threats they are facing. Once this occurs, is when it can lull most IT personnel into a sense of complacency about the overall nature of the threats. This is the point that odds increase that hackers will be able to break into mainframe computers that are storing large amounts of information. (Kark, 2011) (Tanzy, 2011)

A good example of this can be seen with the recent announcement that the security firm Stratfor (as they were the victim of this kind of attack.) What happened was a group of hackers identifying themselves as Anonymous had broken into the firm's mainframe and they were able to gain access to thousands of credit cards along with other pieces of personal information. Some of Stratfor largest clients include: the U.S. Air Force, Apple, and the Miami Police Department just to name few. Instead of using this information for illicit purposes, the hackers were politically motivated by calling for the release of Specialist Bradley Manning. He is accused of giving the web site Wiki Leaks tens of thousands of classified U.S. government cables. What the group has been doing is making donations to charity with the stolen information that was obtained. This is problematic, because it is showing the increasing vulnerability that a number of organizations are facing. The reason why, is because most firms are relying on IT security experts and consultants to reduce their risks. During this process is when they will have them store large amounts of data on their mainframe through cloud computing. However, the fact hackers are able to gain access by directly going after portable mobile devices is an indication that they can use this as a way to circumvent various security procedures. Once this takes place, is when they can be able to gain access to large amounts of information undetected. This is significant, because it is showing how there are increasing vulnerabilities that most firms are facing. ("Anonymous Hackers Target U.S. Security Think Tank," 2011)

As a result, IT security personnel must be able to understand the overall nature of the threat and how to effectively counteract what is happening. Otherwise the odds increase that there will be more of these kinds of incidents taking place. This is when there is the possibility that large amounts of information stored on various databases could increase the overall vulnerabilities of an organization to hackers. Once this takes place is when the odds improve, that there will be larger amounts of security breaches that are being reported. This is the point that it will be difficult to protect and store sensitive information that are vital to the success of an organization in achieving its objectives. Therefore, it is essential for IT personnel to create a strategy that will take the changing nature of the threat into account and how it should be effectively counterbalanced.

Specific Tools that can be used to enhance a Firm's ability to protect themselves

To deal with any kind of possible threats to the database in the future all organizations must be able to use a number of different tools in achieving these objectives. The best way that this can be accomplished is through having an approach that will specifically address the overall nature of the threat. This means that all organizations must implement an approach that is based upon flexibility and utilizing techniques that will deal with these challenges on the various mobile devices. To do this there must be an all-encompassing strategy that will concentrate on a number of specific tactics. The most notable include: storing information is absolutely necessary, protecting database that is accessed over public networks, configuring devices to block external spying, encrypting sensitive information, utilizing mandatory access control, conducting audits and backing up critical data. These elements are important, because the combination of them can allow an organization to adapt with the various threats that they are facing. Once this occurs, is when they will reduce the chances of allowing hackers to use this as a backdoor to receive key pieces of information. (Olzak, 2008)

Storing what is Necessary

This is when a firm is limiting the total amounts of data that is stored on smart phones and tablets. What has been happening is the lack of control of this information has allowed employees to download critical pieces of data that are sensitive such as: spreadsheets, customer files and various pieces of financial information. When a hacker is able to gain access to these devices they will automatically be able to retrieve files that are considered to be classified in nature. Moreover, this information could provide them with the ability to easily access larger amounts of an organization's files. This is because the data that is stored on these devices will often have user names and passwords for entering their database. Criminals can use this as way to make themselves appear to be the employee accessing these files. Once this occurs, is when IT personnel will not be able to identify any kind of unusual activity. This is the point that hackers can anonymously be able to retrieved large amounts of information despite the various external security blocks that are in place. (Olzak, 2008)

Protecting Data that is accessed from Public Networks

One of the most common methods that hackers are using to gain access to various devices is through public networks. This is because various WIFI connections do not have the same kind of security protocol as large organizations. At the same time, any kind of encrypted data that is received will not be secured. The reason why, is because most of these sites do not have any kind of SSL certificates or firewalls in place. This is problematic, because it can allow criminals to have access to information without the other party knowing what is happening. Once this takes place, is when the odds increase that there will be a number of challenges associated with maintaining control of various pieces of data. This is when hackers can use this to gain access to wide variety of areas inside the organization's database. To prevent this from happening, it is advisable that all firms require anyone who is accessing their database to use websites that have an SSL certificate. This will reduce the ability of criminals to monitor what kinds of activities are occurring. (Olzak, 2008)

Configuring Devices to Block External Spying

When we are configuring a device to prevent external spying is the point that a firm will require everyone to establish some kind of firewall. This is because most people will assume that the security provisions from the internal operating system will protect them against possible breaches. However, the problem is that most hackers have figured out how to overcome these defenses. As a result, firms must require employees to install and update a secondary firewall from one of the well-known security providers (i.e. McAfee, AVG or Symantec). This will prevent hackers from being able to access critical prices of data. As these kinds of firewalls are serving as secondary barrier that will make it difficult for them to overcome the security provisions. Once this takes place, it means that criminals will have to try numerous tactics in overcoming these barriers. This is the point that they will move on to other targets with greater vulnerabilities. (Olzak, 2008)

Encrypting Sensitive Information

Another avenue that must be taken is all organizations need to be encrypting sensitive information. This is accomplished by requiring employees to access sites from URL addresses that have SSL certificates. At the same time, the individual must not be allowed to store any kind of end data that they are receiving. If…[continue]

Cite This Research Paper:

"Portable Mobile Devices I E Smart" (2011, December 27) Retrieved October 23, 2016, from http://www.paperdue.com/essay/portable-mobile-devices-ie-mart-48694

"Portable Mobile Devices I E Smart" 27 December 2011. Web.23 October. 2016. <http://www.paperdue.com/essay/portable-mobile-devices-ie-mart-48694>

"Portable Mobile Devices I E Smart", 27 December 2011, Accessed.23 October. 2016, http://www.paperdue.com/essay/portable-mobile-devices-ie-mart-48694

Other Documents Pertaining To This Topic

  • Mobile Technology the Ever Increasing Number of Smart

    Mobile Technology The ever-increasing number of smart devices and the mobilization of technology in general has precipitated a number of importance changes in the way people conduct their private and public lives. By examining some importance developments in the area of healthcare, commerce, and politics, this essay argues that mobile devices have already fundamentally altered the human experience of the world, and will continue to do so at an exponential rate.

  • Tablet Devices Replace the Latop

    It initially failed to attract the desired audience, but it is believed that the recent innovations of the re-launched tablet PC would ensure its success (Search Mobile Computing, 2010). While Apple stated that they were the first creators of tablet computers, Microsoft comes to argue the same. Thorn Holwerda (2010) however states that neither of the two it monoliths were the creator of tablet PC. "Well, no. They're both wrong.

  • Wireless Network Technology Mainly I Will Discuss

    wireless network technology. Mainly, I will discuss the main features of wireless technology, and explain how network technology has become so useful in the present time. In the next section, I will give a brief review of ten articles and show how they are related to the above theme of the essay. Finally, I will explain the impact of wireless technology within the next decade. In the present section, a brief

  • Cross Platform Mobile and Web

    82). Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actual content of the widget, namely text, linked images/video or content pulled from a server of Web service. Alternatively, the widget content can be created using Flash, although

  • How Smart Do We Want Smartphones Do We Really Need Them

    Smartphones: Do we really need them? How smart do we want smartphones? Do we really need them? In basic terms, a smartphone can be defined as a cellular telephone with advanced features and capabilities. In addition to being enabled to access the internet, a smartphone sports numerous built-in applications. Some of the features of modern smartphones include, but they are not limited to, video and still cameras, e-mail messaging, MP4 and MP4

  • Windows Me vs Windows 2000 Professional

    Windows ME vs. Windows 2000 Professional Windows Millennium Edition (ME) and Windows 2000 Professional are desktop operating systems (OS) that were released in the year 2000 by Microsoft Corporation, the unveiling of Windows 200 Professional preceding that of Windows ME by a few months. Both operating systems were improvements on the existing Windows software at the time, i.e., the Windows 2000 Professional was a follow-up on the Windows NT 4.0 and

  • Apple s iWatch

    Smart Watches and Their Evaluation Functionality and Usability With Smartphones Smart watch, often referred to as the smart watch is a wristwatch that has been computerized, and integrated with functionality that has been enhanced beyond timekeeping (Miyake, 2001). Moreover, the features of smart watch make it comparable to a personal digital assistant, or a PDA device. The early models of these watches were capable of performing basic tasks that included translations,

Read Full Research Paper
Copyright 2016 . All Rights Reserved