Reason for Approach Considering a person’s personal data is one, if not the single most important assets he or she is in possession of, the processes involved in keeping the said data safe is crucial to avoid being a victim of malicious activities. Mobile device security should be at the top of a person’s list as a form of protecting personal data from the outside threats of malicious code infection, unauthorized data access, identity theft, fraud, and a compromise in the confidentiality, integrity and availability of a person's information.
Prospectus Organization The remaining facets of this prospectus will consist of two more segments, the problem and the solution. Each segment will be broken down and divided into separate topics in order to convey the material in an organized fashion. The first segment will consist of the Problem Statement, it will encompass the background information, causes, business impacts, a cost and risk analysis, any assumptions, and what limitations, if any the problem faces. A list of technical terms is provided for reference as well. The second segment will consist of the Solution technology provides and will provide what guidelines should be followed in order to solve the said problem. It will encompass the areas of business drivers, justification, what the effects are for choosing not to implement the solution, and a detailed description of the preventative solution. Problem Statement
Mobile devices typically lack the security features
With the rapid increase in the number of attempted breaches and resulting damages, there is an increased need for user authentication, especially with numerous unknown mobile devices with which consumers are using to access to IT resources.
However mobile devices also represent a significant risk to information security and data security as, if the appropriate security applications and procedures are not applied, they can be a conduit for unauthorized access to the Eastern Widgets’ data and IT infrastructure. This can subsequently lead to data leakage and system infection. Eastern Widgets has a requirement to protect its information assets in order to safeguard its customers, intellectual property and reputation. This policy outlines a set of practices and requirements for the safe use of mobile devices.
Publicly held companies are not successful by chance. They have to utilize systems that will determine their future and identify potential financial risks, be they environmental or by fellow competitors. The company will focus on five areas of concern that will lead the public to a better understanding of its goals and areas that need improvement. It will make public by means of an organizational statement an outline detailing its purpose as well as general guidelines for accomplishing it. The company will then reveal (with concrete evidence
This article gives a synopsis of threats to the mobile devices and the data existing in them and the available defenses. It classifies seven different types of threats on mobile devices and then it discusses about the precautions that can be taken to avoid these threats. It recommends how to prioritize the different threats and defenses.
This increase is shown as the percentage of smartphone users increased by 26% in 2013 compared to the previous year [1]. As the business environment evolves, the possible solutions to the challenge of bring your own device to work programs must still be considered. As smartphones and tablets are becoming more advanced and allowing for higher functionality and access to applications, the risks of allowing such devices to access corporate information poses a risk. The protection of company’s assets can be achieved as most popular mobile operating systems can provide limited protection against threats but as they are currently being developed, they are being created with more advanced security and better functionality. However, this is not always up to the level of protection that is needed in a corporate organization.
In the current corporate environment, mobile devices such as mobile phones and tables have a great impact on the business process of companies and how employees can perform and fulfil everyday tasks. Companies are adopting the BYOD (bring your own device) policy for management of these devices. To protect sensitive data, employees, and customer, companies must have a policy in place to enable an effective and secure use of these devices. Using mobile devices without having a clear policy and without defining the company’s valuable assets that need protection is bad business and opens up unnecessary risk.
Today’s technology-based society is plagued with an over abundance of mobile devices. These devices now control our homes, our transportation, and our
This research article examines the security concerns of using mobile technology systems in health care institution. Various methods of ensuring privacy and security of patient’s electronic medical information are addressed. This high quality article is relevant for present day mobile security issues. The authors utilize a host of credible references in the health care and information technology fields.
Quite a few questions were asked mainly to identify how sensitive and the kind of information that are stored in participants’ smartphones. The results showed that forty percent of our interviewees were concerned about attackers accessing their smartphones for their pictures. It also indicated that participants sent pictures on their WhatsApp application without any concerns about the security implications. Only twenty percent admitted having backups of their data while a lot more about seventy percent really cared about systematic backups of their data.
According to the U.S. Department of Homeland Security in the article Cyber Threats to Mobile Phones, phones are now sharing hardware and software similar to a PC and becoming each time more like a PC. Therefore, the risks of being hacked are increasing, allowing hackers to attack mobile devices the same way as if they were doing it with a regular PC. Personal and professional information are more often stored on mobile devices therefore it is imperative to have our data secure. Security solutions for mobile devices are not as broad or high-tech as those for PCs. The majority of mobile security relies on the proper use and smart choices that the user makes on a daily basis to be protected against cyber attacks. Even the most careful person can be attacked but the possibilities of that happening are less when you are proactive.
New technology has spurred innovative ways to spend money. As mobile payment systems continually develop, consumer financial and personal information risk exposure. Industry officials state the technology is growing, but security specialists argue growth of will inevitably attract fraud. Smartphone owners must treat their phones as a miniature computer and equip proper anti-virus and malware software. Enacting preventative methods will help thwart security breaches over mobile networks. (Ladendorf, 2013)
The Pocket Protector App is a programed that allows users to store various information such as passwords and pine codes securely into their smartphone’s. The purpose of the application is to provide users with a convenient way of organizing important security data in one application that is user-friendly and visually appealing. Emerging technologies are replacing the need for people to write things down, which creates another problem. People are finding it difficult to keep up with passwords, usernames, important dates, etc. This app is being developed to solve this problem by allowing people to still rely on their electronic devices without the risk of losing important information.
In the recent years technology is innovating and expanding at a rate never seen before Barton (2013). Improvements in technological ability are estimated to increase by thirty two times over the next five years The Emerging Future (2015). Heggestuen (2013) describes the most noticeable growth is in the mobility space. BI Intelligence recently calculated that one in every 5 people in the world own a smartphone and every 17 owned a tablet. In turn this movement has speed up the consumerisation of IT trend. Workers are adopting technologies directly and using personal mobile devices for their daily work without the help, consent, or awareness of their IT department. Furthermore it has been found that line of business managers and business units are making their own technology decisions through cloud services and SaaS since they are readily available and their ease of use and setup Dineley (2012). Some companies are adopting a Bring your own Device (BYOD) strategy as part of their mobility strategy. This consumerisation of technology has put organisations data security more a risk than before. According to Nelson (2012), in today’s mobile world, IT are finding it more difficult to safeguard corporate data in the mobile world.
Thesis; Along with the efficiency mobile devices render, come along its risks, in which raises substantial security and privacy concerns. It’s important to be aware of the possible threats a mobile can have, along with knowing what and how to secure information, as well as trying to prevent threats from happening.
Hello reader. I have chosen the IEEE Symposium on Security and Privacy. The IEEE Symposium on Security and Privacy has held a conference every year since 1980 to touch on major points going around the cyber security career fields and fields alike. Upon review of the call for papers section of their website; some topics stood out and interested me greatly. The first topic I would like to go over would be mobile and web security and privacy. Mobile computing has risen exponentially in the past decade. We find that more and more users are turning to smartphones and tablets instead of desktops to take care of personal and business related tasks. While completing important tasks while on a bus or metro transit seems nice, the reality is that people are putting sensitive information at risk if they do not properly protect themselves. According to the French telecommunications equipment company Alcatel-Lucent, an estimated 16 million mobile devices worldwide were infected by malicious software in 2014. This figure only accounts for infected mobile devices whilst another 5.2 million smartphones were lost or stolen in the United States alone in 2014. Back to the IEEE Symposium on Security and Privacy; they had a workshop specifically for mobile security threats and technology that will better assist us in preventing statistics like the ones mentioned above. Their workshop is called ‘Mobile Security Technologies’ or MoST. Mobile Security Technologies (MoST) aims at bringing together