StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cybersecurity and Mobile Devices - Essay Example

Cite this document
Summary
.The author of this essay "Cybersecurity and Mobile Devices" describes the issue of cybersecurity in relation to mobile devices. This paper outlines  cybersecurity threats and discusses steps to be undertaken by the smartphone users would play a vital role in restricting cyber-security crimes largely…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Cybersecurity and Mobile Devices
Read Text Preview

Extract of sample "Cybersecurity and Mobile Devices"

Cyber security and Mobile Devices Introduction Smartphones are considered a most important gadget, which enables a user to perform multiple operations such as calculation, banking, ticket booking, and game-playing. The world is a smartphone-based world, with an ever-increasing population getting attracted by smartphones. Multiple use of the smartphone has led to the development and spread of several issues such as cyber security, which inhibits the ability to gain vital user data from the smartphones and making it available for other users. The above knowledge has been comprehended with the assistance of the article ‘Cyber security and mobile threats: the need for antivirus applications for smart phones’, which focuses upon the need for development of anti-viruses for smartphones (Wright, Dawson Jr. & Omar, 2012, pp. 45-50). Furthermore, I feel that Cyber security is a major concern now a day, as there has been an increase in the number of issues associated with cyber-security in smartphones. Cyber-security concerns mostly arise in situations, wherein, a customer gets connected with the outer world with the help of mobile internet available on the smartphone as yet another important function. The hackers, who have the ability to gather, analyze as well as exploit vital information from smartphones and use them for the fulfillment of their personal aims and benefits, cause emergence of cyber threats. Hence, many nations around the globe are facing several challenges regarding elimination of the cyber security threats and accordingly, have developed a number of tools to restrict their expansion. In this regard, I have focused upon the article ‘Smartphone information security awareness: A victim of operational pressures’, which aims at determining knowledge and behavior of the employees of an organization towards security of organizational data that the employees stockpile within their smartphones (Allam, Flowerday & Flowerday, 2014, pp. 64). Hence, the paper focused on cyber security and the negative consequences on smartphones. Increase in Cyber Security Threats In the present day context, cyber-crime is identified as an important security concern with the development of internet and technology. In this context, I have researched about cyber-security in smartphones for the increased use of the same. Additionally, the prevalence of the threat has been present globally, owing to which a study of the subject would be important for smartphone users. Advanced capabilities possessed by the modern-day smartphones are paving the way to increase the overall customer base of smartphones around the globe. The popularity of smartphones amongst the customer, apart from the lenient security exhibited by smartphones attracts the attention of attackers and hackers. In this respect, the subject attracts my attention in an utmost manner, as I possess required knowledge about cyber-security. The suggestions have been drawn from the article ‘Managing cyber security risks’, which gives a proper justification on management of cyber security risks associated with smartphones (Drew, 2012, pp. 44). Smartphone market has expanded enormously in the recent years leading to the smartphone market surpassing the ‘Personal Computer’ (PC) market. This resulted in inflow of a number of hackers shifting their target towards smartphones who use a variety of old as well as modern day hacking techniques in order to extract potentially important information. Respectively, from various studies in the field of cyber security, I have found that the number of occurrences relating to smartphone hacks grew at an annual rate of 42%, between the years 2009 to 2010 (Wright, Dawson & Omar, 2012, pp. 40). This revealed the reality that the numbers of cyber security threats in relation to the smartphone users are increasing on a high rate and the anti-threat measures are unable to cope up with such problems with a significant pace (Drew, 2012, pp.45). I am technically knowledgeable about the fact that smartphones enabled the users to make use of internet services such as email, GPS services and access to location services such as maps among others. Although the user base has increased to a considerable extent, but the number of security measures concerning smartphone threats has been considerably low when compared to the computer security problems. In contrast to the security measures in PC such as data encryption, antivirus and firewalls, there is a limited existence of safety measures in case of smartphones. The cyber security problems are mostly encountered in the social networking applications installed on smartphones, which lacks adequate security checks and can lead to segregation of vital information pertaining to smartphone user. In this context, the article on ‘impact of cyber security on SMEs’, provides a distinct overview of the negative consequences of cybercrime upon Small and Medium Enterprises (Amrin, n.d., pp. 8-14). Reasons behind Cyber Security Attack I feel that with an increase in the number of smartphone users in the world, there has been an increase in the threats associated with the use of smartphones. With the rise in user base, there has been an increase in the number of cyber security attacks. The attributes pertaining to a mobile phone such as features of portability, ease of use, make smartphone vulnerable to a number of cyber-security attacks. One of the core reasons behind smartphone vulnerability to cyber security complications is the feature of portability. Accordingly, based on my understanding, in case a phone is lost or stolen, the attackers can exploit all the relevant data including corporate, financial as well as personal data. Hackers who possess sophisticated knowledge regarding hacking techniques through which they can gain access to real data can raise security threats. The above information has been discussed in detail in the article ‘A survey of emerging threats in cybersecurity’, which enabled to gain adequate understanding of increasing cyber threats associated with smartphones (Jang-Jaccard, 2014, pp. 980). I am surprised by the fact that cyber security also possesses considerable risk on smartphones, as earlier I had an idea that cyber security threats can be performed on computers and laptops only. Mobile applications, which are provided with pre-installed in the smartphones or that have been installed by the user can be major tools of exploiting important data. Smartphone applications developed by various users possessing the ability to fulfill users’ requirements may harm the smartphone; as such applications are able to obtain users’ personal data through the inputs provided by users in order to use the applications. I think that some of the applications exhibit the ability to gain access to locked phone data, as they are unregulated applications, which save shared information by the users and upload them in their personal database. Another risk that lies behind cyber-security threats is the use of ‘rooting’ feature on smartphones by the users. Rooting enables users to install a number of third-party applications by surpassing the pre-installed applications and security features. In this context, data collected from article ‘Quest Global chief upbeat over Nest Software acquisition with over Rs 500 crore deal’, provides a quick insight into future risks associated with cyber-security threats in smartphones (FRPT Research, 2015, pp. 10-11). Furthermore, I can contemplate that even highly sophisticated applications can be under the threat of cyber-attacks as many attackers develop applications that possess the ability to hinder and crash smartphone software. Sometimes, users may also participate in rise of cyber-security threat, as they can activate an attack by their specific explicit actions. A user’s vital data may also get exposed to cyber-security risks, as some of the applications synchronize valuable data by acting as a background application (Wright, Dawson & Omar, 2012, pp. 55-60). In addition, I can ascertain that some of the phishing attacks in relation to cyber-security concerns may require the users to install malicious applications in their smartphones possibly through communication and mailing applications. One of the most widely known examples of cyber-security threat in smartphone is ‘Email Phishing’. In a similar manner, phishing and gathering vital data can also take place via messaging and voice call applications. This results to user sharing data over the applications, which consequently lead towards intruding private as well as personal data. In relation to the above mentioned criteria, article on ‘Technical information paper-tip-10-105-01 cyber threats to mobile devices’, provides a comprehensive knowledge of the cyber threats associated with smartphones (Department of Homeland Security, 2010, pp. 10). Consequences of Attacks Consequences of the cyber-security threats as ascertained by me can be harmful, if appropriate steps are not taken to reduce the threats concerned with security of data. Malicious applications could possibly lead to the creation of a network, which will inhibit connection between various devices that are controlled by a cyber-security hacker. This is usually referred to as ‘Bosnet’, as multiple phones are being inter-connected to gain and acquire valuable information pertaining to user information. Furthermore, I can assert that hackers can provide several inputs and initiate harmful commands over the devices, which may lead to sharing of information. It must also be noted that use of malicious applications by the users could lead to spread of viruses during transfer of information by the users from one person to another. The above knowledge has been gathered from the article ‘Delegate the smartphone user? Security awareness in smartphone platforms’ that offers a deeper understanding of the security risks associated with different smartphone operating platforms (Mylonas, Kastania & Gritzalis, 2013, pp. 49-55). In addition, I perceive that loss of a mobile phone by theft or any other causes may lead to loss of valuable contact information and call records, and personal data such as images as well as videos among others. However, most importantly, it has the ability to derive data from cybercrime by way of jeopardizing monetary data through applications based on providing banking services that store bank-related information. The consequences may lead to fatal losses as hackers’ access to usernames as well as passwords along with information pertaining to users can lead to devaluation of the financial account. This may be a result of hackers’ access to users’ bank account or else knowledge of the credit card credentials. The above-specified information has been collected from the article ‘A critical review of 7 years of mobile device forensics’, which aims at analyzing on ‘Mobile Device Forensics’ from the past 7 years and tries to find out the drawbacks pertaining to the smartphones’ level of security (Barmpatsalou, Damopoulos, Kambourakis & Katos, 2013, pp. 330-331). Hackers and cybercrime attackers possess the ability to take out information revealing personal information and could possibly sell the data for personal benefits. Although GPS location provides benefit to the user to track down the culprit, but I asserted that, the same may lead to the establishment of inter-connections between the hackers. In case the users are able to track down the device successfully, the users may receive potential threats via spam mails and messages on the device and may lose all the pre-existing data. Hence, the above data has been collected from the article ‘standard for developing secure mobile applications’, which aims at management of risks and in development of ways by which security applications can be developed to defend smartphones under risk of cyber threats (Dye & Scarfone, 2014, pp. 525). Although I feel that, some applications may require the users to secure their information over the internet and gain access to the data in a more, secure manner. However, hackers possess the capability to exploit the vital data shared through online databases and segregate the data around the globe. One such example is ‘Celebrity Photo Hack’, recently conducted by a hacker group upon Apple’s cloud service (Wright, Dawson & Omar, 2012, pp. 50-52). Protective Steps In the research, I have found some of the ideas regarding cyber-security threats on smartphones to be invalid, as the protective steps could have easily controlled them. Accordingly, I have highlighted a number of steps that would lead to safeguarding smartphones from cyber-security attacks. With an increase in the number of hacker base in relation to the smartphone use, several organizations have come up with various tools to ensure minimization and restriction of data to the users. Although the proactive steps may lead to minimization of the threats to a considerable extent, but it may not be able to wipe out the cyber-security threat without the initiative of the users. Hence, users may need to consider a number of steps that would ensure implementation of proper security measures (Allam, Flowerday & Flowerday, 2014, pp. 60-62). According to the awareness regarding the subject, the first step according to me would ne that a smartphone user while purchasing a smartphone must take into account its security features. It must be ensured by the user that the smartphone holds options such as remote wiping of data, password insertion and possesses certificate-based verification services. Next, in order to tackle cybercrimes and data theft, smartphone users need to configure the smartphones, which would ensure that the devices are more secured. The users need to activate password services in the mobile devices, which would increase the security levels to a higher standard. In addition, users can install antivirus software in the smartphones to lock access and data synchronization over the web (Dye & Scarfone, 2014, pp. 530). Furthermore, users can also take steps in configuration of web-based services such as personal accounts. Accounts and web pages can be encrypted by the user, which would allow users to surf net over encrypted connections. This would further enable the users to keep hackers away from spying internet sessions undertaken by the users. Another viable option for the users that can lead to protection of information is disregarding the links sent by hackers via personal mails. In addition, I feel that the users must not be connected with such links that may lead to share of information. In addition, smartphone users must reduce the frequency of posting valuable information over the internet. The users must restrict providing mobile number, personal mails and information on the websites, which would consequently reduce overall threats (Dye & Scarfone, 2014, pp. 530). Malicious applications are not installed on the smartphone and uploaded over online storage services. Use of services such as Wi-Fi, Bluetooth and others available in smartphones must be restricted within the home environment and must not be used in public circles. Finally, based on my perception, users must ensure not to ‘root’ the smartphones and must take steps in deleting data prior to its removal (Allam, Flowerday & Flowerday, 2014, pp. 63-65). Relevance of the Research Research recently conducted by the FRPT Research team, published an overview of the software industry in India susceptible to cyber-security attacks. I have identified that there lies a possibility that the level of cyber-attacks associated with smartphones and use of malicious applications would decline; however, cyber-security threats would aim towards exploiting personal information from the smartphone users. The findings further revealed that the cyber-crime groups target particular segments such as Healthcare and Banking services. Websense, a leading service provider of cyber-security solutions revealed that smartphone applications would be more prone to cyber-security threats, as they inhibit the features of auto-login and access to login credentials. On a further note, I have ascertained that most of the hackers are moving towards gaining access to ‘Personally Identifiable Information’ (PII), as it enables the hackers to use and exploit the data afterwards. The number of cyber-theft crimes escalated with an increase in smartphone users, as PII would enable the hackers to gain access to user data and location (FRPT Research, 2015, pp. 10-11). Conclusion From the above discussion and analysis, a brief understanding of the issue of cyber security in relation to mobile devices can be comprehended. It has been recognized that cyber security and smartphones are interrelated aspects, as cyber security threats can lead to the development of several negative consequences. In addition, I have perceived that there are a number of steps to be undertaken by the smartphone users would play a vital role in restricting cyber-security crimes largely. Finally, protective steps such as encryption and security features are to be regarded by the smartphone users for mitigating cyber-security threats. References Allam, A., Flowerday, S. V., & Flowerday, E. (2014). Smartphone information security awareness: A victim of operational pressures, Computers & Security, 42, pp. 56-65. Amrin, N. (n.d.). The impact of cyber security on SMEs. University of Twente, 1-72. Barmpatsalou, K., Damopoulos, D., Kambourakis, G., & Katos, V. (2013). A critical review of 7 years of mobile device forensics. Digital Investigation, 10, 323-349. Department of Homeland Security. (2010). Technical information paper-tip-10-105-01 cyber threats to mobile devices. Unclassified, 1-16. Drew, J. (2012). Managing cyber security risks. Journal of Accountancy, 44-48. Dye, S. M., & Scarfone, K. (2014). A standard for developing secure mobile applications. Computer Standards & Interfaces, 36, 524–530. FRPT Research. (2015). Quest Global chief upbeat over Nest Software acquisition with over Rs 500 crore deal. Software Industry Snapshot, 10-11. Jang-Jaccard, J. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80, 973-993. Mylonas, A., Kastania, A., & Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47-66. Wright, J., Dawson, M. E., & Omar, M. (2012). Cyber security and mobile threats: the need for antivirus applications for smart phones. Journal of Information Systems Technology & Planning, 5(14), 40-60. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cybersecurity and Mobile Devices Essay Example | Topics and Well Written Essays - 2500 words, n.d.)
Cybersecurity and Mobile Devices Essay Example | Topics and Well Written Essays - 2500 words. https://studentshare.org/information-technology/1865858-cybersecurity-and-mobile-devices
(Cybersecurity and Mobile Devices Essay Example | Topics and Well Written Essays - 2500 Words)
Cybersecurity and Mobile Devices Essay Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/information-technology/1865858-cybersecurity-and-mobile-devices.
“Cybersecurity and Mobile Devices Essay Example | Topics and Well Written Essays - 2500 Words”. https://studentshare.org/information-technology/1865858-cybersecurity-and-mobile-devices.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cybersecurity and Mobile Devices

Mobile Marketing Paper

The use of desktops will lose meaning due to adoption of smaller and mobile devices.... mobile Marketing Name: Institution: Date: In relation to the research on mobile marketing, the target population has been confined to users of mobile phones.... Users of mobile phones are critically analyzed to display their habits.... The researcher has used secondary data from the companies that offer mobile phone services....
3 Pages (750 words) Assignment

Nokia mobile services and applications

Another educational mobile service is a partnership with the Pearson foundation to provide schemes where students between 11and18 can use mobile devices and services to film, mix and edit through collaboration.... Furthermore, Nokia has a partnership with Microsoft to offer business productivity and mobile office solutions.... Furthermore, for Canadian and American developers there is a chance to win a share of $10 million in cash, marketing and devices for designing an app or a game using Nokia's tools....
2 Pages (500 words) Essay

Mobile Computing

This changes the reading culture of people and decreases the amount of revenue from the sale of books, newspapers and other traditional devices.... With regards to… These mechanisms create a number of security threats for the victims and the financial institutions. Risks include compromising the victims' data availability, mobile Banking Question mobile banking, being a novel technique of money transaction, comes with new and advanced security risks....
1 Pages (250 words) Research Paper

Software for wireless devices

First is the number of competing standards for application development on various mobile devices.... First is the number of competing standards for application development on various mobile devices.... he five major software components necessary in mobile computing include 1) mobile operating system such as Microsoft, Symbian, Linux, and other specialized operating systems, 2) a mobile application user interface which is the application logic in mobile devices to operate the various interface devices such as a mini-joystick, touch screen, thumb wheel, and jog dial, 3) the microbrowsers which are actually similar to standard Internet browsers but specially adapted to deal with the limitations in the memory, bandwidth, and smaller display screens of mobile devices, 4) the wireless application protocol or WAP which is the suite of network protocols to enable different kinds of wireless devices to access WAP-readable files on an Internet-connected Web server, and 5) various mark-up languages which is also an area that lacks a single uniform standard; examples of competing standards are wireless markup language (WML), the compact hypertext markup language (cHTML), and extensible hypertext markup language (eHTML)....
1 Pages (250 words) Essay

Memo to Users of Mobile Devices and Computers

The paper "Memo to Users of mobile devices and Computers" discusses that the choice of color for photos as well as the background of the report may make any mobile user ignore the report as well as associate it with some useless reports on the internet.... hellip; Unfortunately, the introduction of mobile devices led to an increase in cybercrimes.... I will include some photos of cybercrime acts on the background of the report so as to capture the attention of the users of the mobile devices....
1 Pages (250 words) Essay

Cause-Effect Analysis

Unfortunately, this advanced functionality exposes these mobile devices possess vulnerabilities that make them attractive and easy targets for exploitation.... The first major cyber threat to mobile devices stems from the size and portability nature of these devices.... mobile devices are vulnerable to malware in similar ways to desktop computers.... Some of these devices include Smartphones, tablet PCs and Personal Digital Assistants (PDAs) among others....
4 Pages (1000 words) Essay

Mobile Health Application

To avoid all these, all mobile devices used by medics must be designed to ask for passwords, special codes or fingerprints in order to gain access.... mobile health technologies are software application programs formulated to offer health services via mobile phones (smartphones) and tablets (Remedy Health Media, 2014).... Many apps have been created and incorporated into the field of medicine to enable medics regularly get… h with their patients despite the location and time (Brookings, 2013) due to these many reasons many apps have been created including Medscape, Epocrates, My Heart Care and much more apps. Medscape is a medical app most used by physicians, nurses and medical students due to its mobile Health Application Insert Insert Security and Privacy Threats on mobile Health Technologies Introduction mobile health technologies are software application programs formulated to offer health services via mobile phones (smartphones) and tablets (Remedy Health Media, 2014)....
2 Pages (500 words) Research Paper

Kinetic Energy in Mobile and Device Charging

hellip; This research will begin with the statement that there is a new technology in the market, which uses kinetic energy to charge mobile devices, tablets, and other small electronic devices.... The small electronic devices include small rechargeable lanterns, rechargeable headphones.... It is different from the ordinary portable charging devices because it does not require electricity to charge it.... It keeps or converts kinetic energy into power, which it uses to charge the devices....
3 Pages (750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us