StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security in Bluetooth and Other Mobile Devices - Assignment Example

Cite this document
Summary
The author of the paper under the title "Security in Bluetooth and Other Mobile Devices" will begin with the statement that mobile phones are one of the most commonly used devices that are being used because of their ease, reliability, and convenience…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Security in Bluetooth and Other Mobile Devices
Read Text Preview

Extract of sample "Security in Bluetooth and Other Mobile Devices"

"Mobile devices are attractive targets because they are well connected, often incorporating various means of wireless communications." (Zhang, 2008) These mobile phones can be the entity of the person or of the organization whose information has to be accessed. The only problem with a mobile device or blue tooth is that it is not as secure as other devices like laptops as it is not provided with hardware-based roots of trust therefore the information or the data stored in these mobile phones can be easily accessed by the process of jailbreaking or rooting. The issues that arise due to the inefficiency and the lack of security encountered by mobile phone devices are not so extreme and can be countered if effective measures are taken to overcome the security threats that persist. "New research reveals 68 percent of mobile device owners who have not adopted financial apps are holding back due to security fear." (Software Immune System). The reason why these mobile phones are not reliable is that android phones can be easily hacked and the iPhone was hacked before it was even released raising doubt about their security in the minds of all.

              The industry which I will take into consideration is banking because of the increasing security threats that are associated with it because of the use of mobile devices. The problem arises as only a limited number of people take time out to secure their phones while the rest leave them accessible to harmful software and hackers. Many users these days get their mobile phones jailbroke or rooted so that they can have access to millions of apps available unaware of the fact that these apps can damage the security of the phone making it prone to malfunctioning. These phones which lack security increase problems for banks and other finance sector as they can not limit access of the users to such applications, mobile devices, or how the user utilizes the mobile phone.

              To keep mobile devices secure banks need to take initiatives on their own so that the integrity of the bank. Banks need to realize that these mobile devices provide an aggressive setting and those applications enabled on the phone are unsafe therefore banks need to take preventive measures on their own and not rely on their customers. Banks and designers who design software are aware of the ongoing security threat in their minds therefore 'public key cryptography is ensured so that security remains intact but this is just not enough. Hackers and software designed to disrupt the system can alter the functioning of the applications. These can change the account numbers, bring changes to accounts, start false dealings, save passwords and pin codes, etc. more actions are needed to secure the apps available on mobile phones whereas it is essential to take preventive security measures to increase the communication protocols. (Ahonen, 2008)

                   The five steps that banks can take to ensure security is as follows. Firstly, to suspect and find out rare and unintentional activities that happen in the bank end through the means of "risk-based authentication and anomaly detection". Secondly, providing mobile devices with untrusted applications can comprise various security structures. Thirdly banks can incorporate another device that can maintain security adding more to the capability of the smartphone itself known as"Out-of-band authentication". Fourthly, integrating the operating system of mobile which can also suggest various security enabling features and options. Finally, incorporating such hardware that can consist of multiple layers of security apart from what the mobile operating system can provide on its own. (Home - Bank Systems & Technology)

                  Implementing mobile technologies and wireless systems are beneficial in a bank and its need cannot be omitted under any circumstances such as mobile banking, funds transfer, wireless protocol implementation, banking facilities, the emergence of ATMs, etc.  (Flower, 2012) All these facilities are only possible through mobile and other wireless resources and are essential components of the functioning of a bank. Thus considering the everyday requirements of a bank to cater the best possible services to its customers, managers need to imply wireless services and mobile technologies in a bank.

                A strong system needs to be established that is based on the techniques mentioned previously in my paper with proper checks and balances to avoid any sort of inherent threat that might come it is the way. To protect the technology from any sort of issues, one needs to have safe information technology IT security that prevents and stops the data to get lost, secures it, and keeps control of the information in the laptop, personal computer, smartphones, or tablets. Secondly, information assurance is required so that in case of any mishap the data remains intact using back up. These two technologies are essential to counter the security issue. The problems that arise with wireless radio signals can be interference either manmade due to excessive commands or a fluctuation caused by movement etc.

         In a nutshell wireless technology and mobile devices are essential in all fields of life and one cannot under any circumstances omit their use it. Measures can be taken to overcome or deal with any issue that might affect the integrity of the system. Today various industries especially the banking sector have taken preventive alternative measures to deal with security threats and provide ease and convenience to employees and customers.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security in Bluetooth and other Mobile Devices Assignment”, n.d.)
Security in Bluetooth and other Mobile Devices Assignment. Retrieved from https://studentshare.org/information-technology/1479097-security-in-bluetooth-and-other-mobile-devices
(Security in Bluetooth and Other Mobile Devices Assignment)
Security in Bluetooth and Other Mobile Devices Assignment. https://studentshare.org/information-technology/1479097-security-in-bluetooth-and-other-mobile-devices.
“Security in Bluetooth and Other Mobile Devices Assignment”, n.d. https://studentshare.org/information-technology/1479097-security-in-bluetooth-and-other-mobile-devices.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security in Bluetooth and Other Mobile Devices

Bluetooth Technology

This paper ''Bluetooth Technology'' tells that Bluetooth technology is a wireless technology that is used between two paired devices.... Data like videos, pictures, music, information, and voice can be transferred easily between the two paired devices over a short distance and that too within seconds.... Hence the name has its inspiration the King's work, Bluetooth is all about connecting and communicating in an uninterrupted single flow allowing different devices from cell phones to automobiles to communicate and network with each other....
6 Pages (1500 words) Essay

Bluetooth Technology

This created a universal path for mobile, computers and phones as well as other devices to connect wirelessly with one another.... Examples of the electronic devices range from mobile phones to headsets, MP3 players, computers and peripherals.... The Bluetooth Technology has essentially replaced the use of cables that allow devices to connect.... For example, through the software development and wireless technology, the market prices of electronic devices increase (Campbell, 63)....
6 Pages (1500 words) Essay

Bluetooth Technology

'Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security.... Bluetooth technology is a key short-range communications technology or wireless protocol, which can be used to connect a wide range of electronic devices including mobile phones, laptops, etc when they are close to each other....
5 Pages (1250 words) Essay

Bluetooth Application Development

Understand on as we expose bluetooth and give details on how to make it work with popular phones.... When it comes to synchronizing the PDA with the laptop or just exchanging information with a friend via laptop/PDA one would still need to either use cables to connect the two devices.... Bluetooth is a short-range, low-cost, small form-factor, and secure wireless solution that promises to completely eliminate the need for all data cables connecting the devices in homes and offices....
12 Pages (3000 words) Essay

Comparing Bluetooth and Infrared with Cable Based Communication

"Comparing bluetooth and Infrared with Cable Based Communication" paper states that the three technologies compared have their own benefits and drawbacks.... GHz band to connect blue tooth devices that may be within ten meters of each other to share at up to 720 Kbps (How Bluetooth Works).... First of all wireless communication between various devices such as personal computers in a small network or between mobile phones or between a personal computer and its connecting devices such as mouse and keyboard can be employed....
8 Pages (2000 words) Coursework

Application of Bluetooth, Advantages and Disadvantages of Using Bluetooth

This essay "Bluetooth Device" will look at Bluetooth technology and its compatible devices.... Bluetooth is a wireless technology which is a short-range communication technology which is intended to replace the cable that is used in connecting portable devices or fixed ones and at the same time maintain a high level of security.... However, Bluetooth denies a uniform structure of which represents a wide range of devices that are used for connection and communication with each other....
5 Pages (1250 words) Essay

Advantages Of Bluetooth Technology implementation In Modern Life

The implementation of the Bluetooth technology offers us to establish automatic, wireless and inexpensive means to communicate business management and handling devices.... There are lots of devices in the business information systems that are coming out by means of Bluetooth capabilities.... luetooth service utilizes radio waves to transfer data that's mean distances between each Bluetooth devices has to in short distance.... This new technology allows connecting wirelessly to computers, mobile phones, and personal digital assistants or PDAs....
10 Pages (2500 words) Case Study

How Bluetooth Works

Signals are transmitted via airwaves in bluetooth.... Bluetooth may simply be stated as a means of establishing connectivity between two or more computing devices without the need of physical connectors.... The process involves the agreement of both the connecting devices upon a series of terms that would be followed when data would be transferred between them.... The devices get connected at usually lesser than 1Mbps over short distances around 30 feet in length at most....
14 Pages (3500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us