¶ … Mobile Devices on Cybersecurity One of the most important aspects of our current age and the rapid pace by which technology has developed has a direct connection to the development and use of smartphones. The first smartphones were just capable of allowing one to check one's email on one's phone: nowadays smartphones appear to be bounded by nothing. They are razor-sharp and razor fast tools for offering up efficient and convenient means of accessing information. However, given these abilities and trends of these phones, they are still vulnerable to cyber attacks. "Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installed security software. This lack in security is an opportunity for malicious cyber attackers to hack into the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditional security software found in personal computers (PCs), such as firewalls, antivirus, and encryption, is not currently available in smartphones. Moreover, smartphones are even more vulnerable than personal computers because more people are using smartphones to do personal tasks" (Wright et al., 2012). For instance, smartphone users often do their banking online and make purchases online, along with engaging in monetary transactions, such as purchasing goods, redeeming coupons and processing payments: these are all the types of transactions that are particularly vulnerable to cyber attacks because the hacker can ultimately get through...
Just as one has to be educated about the number of minutes one is able to use and other details related to the cell phone contract, one also needs to be cognizant of scams designed particularly for mobile phones. Programs in place which stress the education of all users about these threats are an absolute necessity. "A common one offers a free iPad to persuade you to subscribe to products or services, which turn into pricey subscriptions. As you do with email, independently verify the validity of any offer before you take any other action" (rbc.com). Similarly, users need to be educated about the process of buying and downloading new apps; users need to be taught the necessity of being loyal to reputable sources to help ensure that there is no unwanted and malicious software concealed within the new application.Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now