Threats & Vulnerabilities of Mobile Devices Essay

Threats & Vulnerabilities of Mobile Devices Essay

Length: 1303 words (3.7 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview

With the increasingly ubiquitous nature of mobile devices and online availability, including smartphones and tablets, there is also an understandable concern about the level of security that is afforded to such devices. This can be considered as increasingly important given the proliferation of policies such as BYOD (Bring Your Own Device) which is being used by diverse organizations as a way of lowering the cost of ownership for such devices while also leveraging the flexibility advantages that their utilization can bring. It is therefore an area of immense interest due to the changing and emerging nature of both the technology itself as well as the security concerns.

Due to the sensitive and confidential information that would exist on such devices, it is imperative that security solutions and processes are implemented in order to protect and secure such content from the proliferation of threats and vulnerabilities which can affect mobile devices (Juniper Networks, n.d.).

Mobile devices are being exposed to a record number of security threats with potentially alarming statistics indicating a 400 percent increase in Android malware for example, while Wi-Fi connections are also being increasingly targeted. While the conventional desktop PC will still continue to serve important functions at both consumer and professional levels, there is an expectation that mobile devices will become the predominant form for accessing both personal and professional content it is understandable that cyber criminals have begun focusing on mobile devices which have at the same time grown their user base while substantially consolidating the operating system variants which makes the surface area for a potential attack substantially larger (...


... middle of paper ...


...com/icloud/find-my-iphone.html

http://www.google.com/android/devicemanager

Sujithra, M., & Padmavathi, G. (2012). Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. International Journal of Computer Applications.
Sujithra, M., & Padmavathi, G. (2012). Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. International Journal of Computer Applications.
Abendan, G. (2013, August 8). Exploiting Vulnerabilities: The Other Side of Mobile Threats. Retrieved from Trend Micro: http://blog.trendmicro.com/trendlabs-security-intelligence/exploiting-vulnerabilities-the-other-side-of-mobile-threats/
Wright, J. (2014). Five Wireless Threats You May Not Know. Retrieved from SANS: http://www.sans.edu/research/security-laboratory/article/wireless-security-1

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Mobile Technology Is Not A Smart Phone Essay

- In the world we live in today, it seems that you almost cannot buy a piece of electronic equipment that does not contain some kind of wireless capability. Back when wireless internet first became available to the average consumer it was confined to our home network. As the technology continued to become more and more advanced, the wants of the consumer continued to grow to where we are today. Next time you decide to upgrade your cell phone, look and see how difficult it is to find one that is not a smart phone....   [tags: Mobile phone, Bluetooth]

Strong Essays
2017 words (5.8 pages)

Mobile And Cloud Security : Mobile Security Essay

- Mobile security, also called wireless security, refers to the protection of laptops, tablets, and smartphones, other computing devices as well as the networks they connect to from vulnerabilities and threats which are related to wireless computing. Mobile security is a broad term that entails several issues such as protecting a mobile device from malware threat, reducing risks and also securing the mobile device and its data in the incidences of theft, accidental loss of the device or unauthorized access....   [tags: Security, Computer security, Information security]

Strong Essays
1126 words (3.2 pages)

Mobile Device Attacks Essays

- Mobile Device Attacks Mobile devices are more prevalent today than ever. In fact, escalation of the pure power and speed of mobile processors, advancements in mobile operating systems, and the overwhelming attractiveness of mobile broadband make cell phones and tablets the best candidate for mobile computing devices (Wong, 2010). With this increased use, though, both by the general populace and by businesses, the need for security and awareness of the risks inherent in their use is paramount. Unfortunately, the very thing that makes mobile devices so valuable also makes them more vulnerable to attack....   [tags: technology, mobile processor, ]

Strong Essays
1627 words (4.6 pages)

Common Vulnerabilities Facing IT Managers Essay examples

- Vulnerabilities are like a thorn in the side of every single organization doing business today. In the IT world vulnerabilities are bugs or flaws, a weakness, or an exposure of an application, system, device, or service which could lead to a failure of confidentiality, integrity, or availability (Liu & Zhang, 2011). They are to companies today what the black plague was to Europe in the 1300’s. It doesn’t even matter if the organization is connected to the internet or not it’s still vulnerable to some type of attack....   [tags: Information Technology ]

Strong Essays
1701 words (4.9 pages)

Mobile Phones Are Not Only Used For Communication Essay

- Introduction Android operating system is one of the most popular mobile operating systems. With the increasing inclination of people towards technology we have seen that mobile devices play a very crucial role in one’s life. Mobile phones are not only used for communication, but for educational purposes,getting location, for social networking sites, clicking pictures and many more. Hence, mobile phone have become an inseparable part of our daily life. With the increase in usage of smartphones, there is a need to provide more secured applications to the users also(the need of secured applications for users is growing heavily, too.).Among all the operating systems available, Android operatin...   [tags: Smartphone, Windows Mobile]

Strong Essays
1071 words (3.1 pages)

Mobile Security Catching Up : Revealing The Nuts And Bolts Of The Security Of Mobile Devices

- Mobile Security Catching Up. Revealing the Nuts and Bolts of the Security of Mobile Devices Summary: The paper tells about growing importance of mobile security and explains differences between mobile and normal security. The paper provides a brief overview of mobile network security and mobile threats. The author stated that, beginning the use of smart phones have become so powerful and affected security system which in turn led to increased importance on mobile security....   [tags: Computer security, Security, Physical security]

Strong Essays
890 words (2.5 pages)

Essay on Network Security Threats for ASDI

- New and Rapidly Advancing Threats One of the biggest threats to network security in 2014 is the end of support for the Windows XP operating system (OS). On April 8th 2014, Microsoft will discontinue support for the aging OS. What this means for users of Windows XP is that as new vulnerabilities and exploits are discovered, they will not be fixed – the vulnerabilities will only continue to grow. For any business environment that is still using Windows XP beyond April 8th, the machines running the OS will become the organization’s biggest security flaw....   [tags: sand boxing, windows xp]

Strong Essays
1232 words (3.5 pages)

Internal And External Threats Of Network Security Essay

- Relentless cyber criminals, disgruntled current and former employees and careless users can bring down your computer networks and compromise data. Network security 's made up of the hardware, software, policies and procedures designed to defend against both internal and external threats to your company 's computer systems. Multiple layers of hardware and software can prevent threats from damaging computer networks, and stop them from spreading if they slip past your defenses. The most common threats to your systems: Malicious programs like viruses, worms, Trojan horses, spyware, malware, adware and botnets Zero-day and zero-hour attacks Hacker attacks Denial of Service (Do...   [tags: Virtual private network, Computer network]

Strong Essays
885 words (2.5 pages)

Essay on Major Threats Of Health Care Facilities

- Major Threats in Healthcare Name Institution Tutor Date  Research shows that, doctors and nurses make use of new technology such as mobile devices in handling patients suffering from different illnesses. It has been established that virtualization is essential especially when it comes to provision of affordable and adequate care for patients who are in a rural setting. On that vein, preventing cyber-attacks and other security breaches has proved that it is never ending. Further studies show that nurses, doctors, specialists, clinicians, staff members, administrators, and other specialists in a healthy facility are using several devices such as tablet, cart with laptops and printers and...   [tags: Health care, Health, Health care provider, Illness]

Strong Essays
956 words (2.7 pages)

Information Security Officer for Small Pharmacy Essay

- ... Vulnerabilities include lack of redundancy and back-ups, inadequate network management, lack of planning and implementation of communications cabling and inadequate incident handling (Mongie 2009). In addition to the threats and vulnerabilities inherited with wired local area networks (LAN) there are many more risks associated with the use of wireless and mobile technologies. The use of laptops, smartphones, and tablets create vulnerabilities that can fall outside our network securities measure....   [tags: medication, duties, threats, physical]

Strong Essays
1919 words (5.5 pages)