I will be searching about the Security Risks of Mobile Phones, Expanding on them, how they affect us and what we can do to prevent them. “About 75 percent of the world has Mobile Phones”. I will be searching how it affects their everyday life. I will also talk about different Mobile Phones and what kind of risks they contain. It is a Vast and broad topic which requires a lot of Research. I will be searching different sites to make sure that I have
Why we Choose it?
We Chose Mobile Security Risk because we thought it was a really nice area to expand our knowledge in and also expand the knowledge of the person who is or might be read this. This subject was chosen by all of us and decided to start the research straight away to know each other’s knowledge about the Security Risks of Mobile Phones. Another factor which made us choose this was that we all had mobile phones, which we use every day so we that it will pretty easy to find the information but to decipher that information will be hard because there are so many sources to get the information from.
From the Research that I have done I have found quite a lot of risks for mobile phones. Every phone from different countries has different Security risks. Different risks affect people differently; some are on a really small scale and some risks which can ruin people’s lives.
Fake vs. Real— There are lots of fake mobile phones that are circling around us. Some people who can’t afford the real smart phones tend to buy the fake smart phones because they don’t want to feel left out. The smart phones that are out right now have more copies of them than actual self, because in china there about 1.25 billion mobile phones, about 35 percent of them are smart...
... middle of paper ...
BBC. "314 mobile phones 'stolen in London every day'"http://www.bbc.co.uk/news/uk-england-london-21018569. BBC, 15 January 201. Web. 21 Nov 2013.
Caroline Vutagwa. "CEO WEEKENDS:BOTSWANA FAKE PHONE DEALERS RISK 10 YEARS IN JAIL & OVER $200,000 IN FINES - See more at: http://techmoran.com/ceo-weekendsbotswana-tighten-up-on-counterfeit-and-unapproved-mobile-phone-s" http://techmoran.com/ceo-weekendsbotswana-tighten-up-on-counterfeit-and-unapproved-mobile-phone-sales/. TECH MORAN, Friday, August 23rd, 2013. Web. 21 Nov 2013.
What Risks are there?
Author: Steven Furnell (July 2009).
Mobile Security A Pocket Guide.
Publisher: IT Governance Publishing.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- The Impact of Mobile Devices on Cyber security: The modern society including corporate environments has been characterized by the proliferation of mobile devices. The increased use of these devices is attributed to the significant opportunities they bring and their contribution towards enhanced communication. However, the increased use of mobile devices has been accompanied by considerable concerns regarding the privacy of personal information and sensitive corporate data that are stored on them.... [tags: data, hackers, carelessness]
1123 words (3.2 pages)
- Mobile security, also called wireless security, refers to the protection of laptops, tablets, and smartphones, other computing devices as well as the networks they connect to from vulnerabilities and threats which are related to wireless computing. Mobile security is a broad term that entails several issues such as protecting a mobile device from malware threat, reducing risks and also securing the mobile device and its data in the incidences of theft, accidental loss of the device or unauthorized access.... [tags: Security, Computer security, Information security]
1126 words (3.2 pages)
- Mobile Device Attacks Mobile devices are more prevalent today than ever. In fact, escalation of the pure power and speed of mobile processors, advancements in mobile operating systems, and the overwhelming attractiveness of mobile broadband make cell phones and tablets the best candidate for mobile computing devices (Wong, 2010). With this increased use, though, both by the general populace and by businesses, the need for security and awareness of the risks inherent in their use is paramount. Unfortunately, the very thing that makes mobile devices so valuable also makes them more vulnerable to attack.... [tags: technology, mobile processor, ]
1627 words (4.6 pages)
- Over half of all companies store sensitive customer information on mobile devices. It is a remarkable percentage that when dwelled on, can be truly alarming. Jason Ankeny, an Executive Editor of FierceMobileContent and FierceDeveloper and Jeff Drew, Senior Editor of The Journal of Accountancy, have concluded just that. A major shift toward mobile device procurement and usage has taken place in just a few years’ time. In parallel, development of mobile applications –programs designed to run on mobile equipment-- have also developed along a similar curve and timeline.... [tags: technology, mobile devices]
873 words (2.5 pages)
- The poll also indicated that application security was another vital concern. One of the challenges facing mobile apps is the fact that most apps request too many privileges. For this reason, such apps have access to various data sources in a particular device. Many mobile apps especially free apps are designed and linked to advertising apps. Such ties make contacts, geolocation data and browsing history vital to the application developers. As consumers want free apps, the developers tend to monetize the apps.... [tags: Computer security, Authentication, Authorization]
1204 words (3.4 pages)
- Introduction According to Davis (2012), “Nine out of 10 technology pros think smartphones and tablets will become more important to business productivity in the next couple of years. Seventy-two percent expect to offer more bring-your-own-device options so that employees can access company data with their personal gadgets.” The use of personal electronic device usage is on the rise in the corporate workplace. Although there are opportunities associated with this; there are also risks involved. Companies and government IT divisions need to evaluate these risks, and put specific mitigation plans in place to establish policies to assure that business information is secure.... [tags: personal devices, risk mitigation]
577 words (1.6 pages)
- 6. Although having a wireless device is handy, it is also an intrusion...people need some privacy...they should not always be reachable...what are your thoughts in this regard. Mobile phones in the recent years have become much more powerful than before by allowing users to browse the internet, check your email, and download programs. But these new abilities means there is a greater risk for viruses, malware, and other threats to your privacy. A mobile device with Wi-Fi capability brings security concerns as the devices can connect to unsecured Wi-Fi hotspots for internet access.... [tags: Internet, Wi-Fi, Bluetooth, Hotspot]
721 words (2.1 pages)
- Not only Ashley Madison, but most of the high profile companies reported data breach in recent years. For instance, in March, health care insurance provider Premera Blue Cross reported the hack which had compromised 11 million customer details including financial information such as bank account. Even in the case of Ashley Madison the motivation was different but eventually data, credit card information was compromised. After reviewing the case of Ashley Madison, Here are some of the recommendations gathered from online and text book.... [tags: Computer security, Information security, Security]
723 words (2.1 pages)
- Today, there are over 6 billion people in the world. Out of those 6 billion people, 4.6 billion people have access to a cell phone/ telecommunication device. Technological advances has allowed the cell phone market to flourish and grow since the late 20th century. In fact, in the last 20 years cell phones have evolved from landlines to smart phones. While there are many effects from the growth of the mobile phone market, it is important to observe and analyze the positive and negative externalities on which the mobile phone market presents to both producers and consumers.... [tags: Mobile phone, Smartphone, Internet]
934 words (2.7 pages)
- I have been interested in computer security for a while now. So that’s why I chose to research on some security and privacy issues that are challenging. For example using our cellular phones, playing games online, shopping online and even our private health data, can be invaded by unauthorized users. Therefore, in order to obtain personal data and information in which they can share to other unauthorized persons. These are threats and security issues that we face daily when using our devices and also using the internet.... [tags: Computer security, Security, Information security]
873 words (2.5 pages)