Mobile Devices Security Essay

¶ … virtual environment has become more and more populated with devices and mechanisms that allow people to become increasingly more mobile. There has been a constant increase in the way in which people tend to act in their day-to-day activities by using their personal computers, laptops, tablets, mobile phones and all kind of technology developments that allows them to be in contact with the rest of the world by the touch of a button. These advancements however also determined an increased need for protecting these devices from cyber crime and threats that are no longer traditional and attackable with traditional means of action. More and more often, challenges related to the protection of information that is being transferred via the internet make the subject of research and technological improvements. There are several ways thru which security of mobile devices can be achieved or insured. On the one hand, there is the physical security of personal devices such as the mobile phone. More precisely, currently there are services offered by providers of mobile services that allow for payment of insurance for loss of phone. Indeed, this aspect relates to the replacement of the device; yet, such offers are doubled by technological improvements of software that allows for the clear and up-to-date...

...

An example in this sense is the service provided by Apple Inc. that allows the registration of all Apple devices on iCloud. In this way, all registered devices under a single iCloud account can be tracked down thru the Internet. This applied to the mobile phone allows the owner of the phone to report the device as being lost and localized once the respective device is connected to a wireless connection. The Apple application "Find my phone" therefore allows the device to be localized whether it has been stolen or just misplaced. Further, this application permits the owner of the iCloud account to remotely delete the content of the phone, if suspected of being stolen in order to allow a protection of the data stored on the phone. This example points out a mere functionality of a developed application that is enabled to cater for a basic security need.
On the other hand, there are other more complex security considerations which demand more complex resolutions. Statistics have pointed out that the corporate world is using extensively the mobility such devices provide to its employees in particular. More precisely, "Extensive use of mobile devices connecting to corporate networks - 89% have mobile devices such as smartphones or…

Sources Used in Documents:

Reference

Dimensional Research (2012) The Impact Of Mobile Devices On Information Security: A Survey Of It Professionals. Available online at http://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report.pdf


Cite this Document:

"Mobile Devices Security" (2013, September 16) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/mobile-devices-security-96499

"Mobile Devices Security" 16 September 2013. Web.18 April. 2024. <
https://www.paperdue.com/essay/mobile-devices-security-96499>

"Mobile Devices Security", 16 September 2013, Accessed.18 April. 2024,
https://www.paperdue.com/essay/mobile-devices-security-96499

Related Documents

Mobile Device Security Factors and Implementation of Mobile Device Security Mobile devices have become ubiquitous and its usage is only going up from here. With such an extensive usage of mobile devices for personal and business use, its security becomes an important question. Most devices ado not have the security mechanism in place in the case of a theft, loss or intentional breach of the network and this makes the data present

Security: Mobile Protection As the Internet has become the dominant means of communicating, sharing information, tending to business, storing data, and maintaining records in the Digital Age, the importance of security for the digital world has become more and more realized (Zhang et al., 2017). Not only do companies have to invest in digital security in order to safeguard against threats and risks such as hacking or malware, but individuals also

Mobile Device Management Change Initiative Plan With the growing volume of content, number of applications and information accessed via various devices, Mobile Device Management (MDM) initiative is vital in the management of the mobile enterprise. MDM is more than the ordinary management of devices because it includes system-centered functionality to manage and secure applications and data. MDM is a crucial element of the device life circle, encompassing the device software, hardware,

Mobile Security
PAGES 6 WORDS 1535

Mobile Device Security Analysis of Routing Optimization Security for Mobile IPv6 Networks Defining and Implementing Mobility Security Architectures Approaches to defining, implementing and auditing security for mobility devices have become diverse in approach, spanning from protocol definition and development including IPv6 through the creation of secure mobile grid systems. The wide variation in approaches to defining security for mobility devices has also shown the critical need for algorithms and constraint-based technologies that can

Mobile Devices on Cyber security: The modern society including corporate environments has been characterized by the proliferation of mobile devices. The increased use of these devices is attributed to the significant opportunities they bring and their contribution towards enhanced communication. However, the increased use of mobile devices has been accompanied by considerable concerns regarding the privacy of personal information and sensitive corporate data that are stored on them. In essence,

Abstract - With regard to security, the major issue is that most mobile devices are targets that are in line to face attacks. Mobile devices face a range of threats that capitalize on several susceptibilities usually obtained in such devices. Lack of encryptions is a major threat to security of mobile device networks. Information such as text messages and electronic messages that are sent using a mobile device are more