Mobile Device Security
Factors and Implementation of Mobile Device Security
Mobile devices have become ubiquitous and its usage is only going up from here. With such an extensive usage of mobile devices for personal and business use, its security becomes an important question. Most devices ado not have the security mechanism in place in the case of a theft, loss or intentional breach of the network and this makes the data present it in extremely vulnerable. This paper examines the importance of mobile security and how it can be implemented for greater protection.
Wireless technology has undergone tremendous improvements in the last few years. The capacity and performance have increased multifold and today, the amount of applications and services that can be accessed through the mobile device is staggering. Many different media can be stored and retrieved easily and more importantly, these can be uploaded and downloaded from the internet within minutes. All these functionality have led to an increased need for security because there is a high chance for the data and network to be compromised. Security has to be implemented at different levels to ensure that users have access to all the functionality and information without ever having to worry about rogue hackers and network vulnerabilities.
The Modern Mobile Devices -- Tablets and Cellphones
There has been an explosion in the usage of tablets and cellphones as users are increasingly turning to them for personal and business use. The number of users accessing these devices have been increasing worldwide, thanks to the presence of multiple wireless providers and improved networks.
There are four main kinds of wireless connectivity and they are Wireless Wide Area Network (WWAN) used by GSM and 3G phones, Wireless Metropolitan Area Network (WMAN) used by suburban households and businesses, Wireless local area network (WLAN) used within a floor to connect all workstations and computers and Wireless Personal Area Network (WPAN) used by bluetooth and infrared devices (Urbas & Krone, 2006). Each of these connectivity pose challenges in terms of security identification and implementation and service providers are constantly working on ways to enhance the security of these devices.
BYOD and security risks
Bring Your Own Device (BYOD) is a trend followed by many employees. They bring their own personal mobile phones and tablets to workplace and access company email and confidential information through it. One of the primary drawback of BYOD is the increased vulnerability and data breaches that can occur when confidential information is accessed through public networks. Most 3G and mobile phone networks are unsecured and can be hacked into easily and this is one of the biggest problems facing corporate security specialists today.
User Behavior
The number of wireless access spots also known as hotspots are increasing around the world to give people more connectivity. They are available in airports, hotels, coffee shops, libraries and other public places to appeal to people to come to their businesses. Unfortunately, these public networks have also increased the security vulnerabilities leading to more viruses and hackers.
This is partly due to the lack of security measures implemented in these networks. A survey shows that 60% of the public networks had little to no security and they did not use any form of encryption (Chenoweth, Minch and Tabor, 2010). So, the responsibility is on the user to protect their information and safeguard it from malicious intruders.
Security Threats against mobile devices
Wireless networks offer a high degree of convenience and flexibility to access information on the move. However, they also make the user vulnerable to malicious programs such as viruses and intrusion by other users. The primary difference between a wired and wireless device is its level of security. While a wired device such as computers can be accessed only by the intended users, wireless networks are open and can be accessed by anyone who knows the system. This makes mobile phones more vulnerable to security attacks. Some of the security threats of mobile devices include:
Since these networks are openly available to the public, there is a higher chance for someone to hack into the device and obtain confidential information. One way to avoid this kind of intrusion is to use encryption and passwords, but this means there will be greater efforts from outsiders to steal the passwords.
The bandwidth of any user can be used by others easily and this will not only result in decreased speeds for the user, but will also increase the cost due to higher bandwidth usage. This kind of threat is called leeching and is fairly common among unsecured networks.
Mobile Computing: A Disruptive Innovation Whose Time Has Come The pervasive adoption of mobile computing devices, combined with cloud computing and the quantum gains in application software are creating a globally diverse collaborative platform. These elements taken together are deliver an exceptionally fast and pervasive level of disruptive innovation across all sociocultural and technology sectors (Bernoff, Li, 2008). The impact of this disruptive innovation is so significant that IT departments have
Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework
To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not
Security Information security is a primary concern for consumers and businesses. In "IT security fails to keep pace with the rise of cloud computing," the author claims that in spite of the advancements in cloud technology, information security has not kept pace. This assessment is rooted firmly in fact and best practices in the information security industry. Although their analysis is thorough, the authors would do well to point out the
Mobile Information Technology: Insights from Collaborators I have selected a mobile app that I hope will help in the improvement of patient outcomes in healthcare settings via the further enhancement of care coordination. Thus, I interviewed my Chief Medical Officer (CMO) - Derrick Butler MD; Clinical Medical Director (CMD) - Dr Mann MD; and Assist Medical Director - Nnennaya Omerigbo MD. The interviewees in this case play diverse roles in my organization.
Security in Healthcare The recent advances in technology -- databases that store personal medical records and information -- are bringing tools to patients, doctors and other healthcare professionals that were simply not available just a few years ago. There is hope that eventually, a doctor in Hawaii that is treating a medical emergency for a tourist from Florida, will be able to access the digitally kept medical and healthcare records
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now