Verified Document

Mobile Devices On Cyber Security: The Modern Essay

¶ … Mobile Devices on Cyber security: The modern society including corporate environments has been characterized by the proliferation of mobile devices. The increased use of these devices is attributed to the significant opportunities they bring and their contribution towards enhanced communication. However, the increased use of mobile devices has been accompanied by considerable concerns regarding the privacy of personal information and sensitive corporate data that are stored on them. In essence, mobile devices have significant impacts on cyber-security because the type of data stored and accessed on the devices contributes to heightened security risks. Despite the significant benefits associated with the increased use of mobile devices, they generate new cyber security issues including heightened financial risks, loss of company data, and non-compliance issues.

Increased Use of Mobile Devices:

Mobile devices have become attractive platforms for communication in today's society to an extent that they are increasingly used for storing and accessing personal information as well as company data. The increased use of the devices has been enhanced by the adoption of near field communication for mobile payment services, particularly in business. As a result, people and businesses not only rely on these devices for communication purposes but also use them for monetary services. Actually, it is estimated that the use of mobile devices will continue to grow in the future for various purposes.

However, the increased use of the devices is also accompanied by significant cyber security threats because of the type of information stored on and accessed from the devices. Generally, the increased use of mobile devices in the future will be accompanied by an increase in the volume of attacks that are targeted to the devices (Smith, 2012). Smart phones, tablets, and other mobile devices are associated with increased cyber security issues because they provide another element of a probable cyber attack. Some of the various ways with which these devices contributed to increased...

Parts of this document are hidden

View Full Document
svg-one

Notably, there is a probability of downloading programs or applications that spy on text messages and phone calls. The emergence of these applications is attributed to the fact that hackers are rapidly learning how to collect legitimate applications and repackage them into malicious programs before selling or providing them through various ways to innocent users (Smith, 2012). With regards to the use of these devices for company data, the major cyber security threats include increased financial threats, loss of company information, and non-compliance issues. These issues have particularly been enhanced by the ongoing universal adoption of social media for personal and business purposes and activities. Moreover, the cyber security issues in the corporate world due to the use of mobile devices are fueled by easy access to corporate networks and social media platforms.
Mobile Devices and Cyber security Issues:

As evident in this discussion, mobile devices pose a triple threat to privacy of personal and company information because they are used for personal and business purposes. The increased use of these devices in the future will not only be dangerous to cyber security but will also make cyber attacks become more advanced and widespread. The main impact of mobile devices on cyber security is that it contributes to more security risks in the corporate world. Due to this trend, the modern business environment is characterized by significant security threats and attacks. Some of the major ways through which increased use of mobile devices enhances security risks include & #8230;

Connectivity to Corporate Networks:

Since mobile devices have become common communication…

Sources used in this document:
Reference:

Ayrapetov, D. (2013, February 8). Cybersecurity Challenges in 2013. Retrieved February 8,

2014, from http://www.techrepublic.com/blog/it-security/cybersecurity-challenges-in-2013/#.

Smith, T.D. (2012, January). Cyber Security Emerging Trends and Threats for 2012. Retrieved

from New York State Division of Homeland Security and Emergency Services website: http://www.dhses.ny.gov/ocs/awareness-training-events/news/2012-01.cfm
Research. Retrieved February 8, 2014, from http://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Security Most Important Cyber
Words: 2328 Length: 8 Document Type: Research Paper

The operating system faced these issues due to the lackluster approach from Apple to patch their software in time. As a result, it led to risking the data of personal users. It shows that irregularities in the patching of computers affected users adversely without any fault of their own (Daily Tech, 2012). In addition to that, the operating system of Apple is now considered as one of the most favored

Cyber Security Cloud Computing
Words: 1389 Length: 4 Document Type: Term Paper

Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported

Cybersecurity As an Organizational Strategy an Ethical and Legal...
Words: 3101 Length: 10 Document Type: Research Paper

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Cybersecurity Vulnerability Issues
Words: 2738 Length: 10 Document Type: Research Paper

Cybersecurity Vulnerability What are Vulnerabilities? Hardware attacks because of Vulnerabilities Hardware Data modification / injection The Scientist Argument Secure Coprocessing How organizations can best address its potential impacts Cybersecurity Vulnerability: Hardware Weakness This essay introduces the role that computer hardware weakness opens the door up for attack in cyber-physical systems. Hardware security -- whether for attack or defense -- is not the same as software, network, and data security on account of the nature of hardware. Regularly, hardware

Cybersecurity Recent Case Studies of
Words: 4325 Length: 16 Document Type: Term Paper

The level and sophistication of this attack on the Department of Defense's systems suggests that professionals conducted this attack with significant resources at their disposal and an interest in the national security secrets of the United States. The data mining operation was so successful that, while detected, still managed to make-off with a significant amount of information. Since the attack, the United States responded in a number of critical ways.

Cyber Security Ethical Issues Associated With Ransomware
Words: 893 Length: 3 Document Type: Case Study

Cyber Security Ethical issues associated with ransomware It is only natural that people who are known to you will send you messages through your email address. It is lost on me how those engaging in ransomware business access information about their potential victims like the email address as to send you messages that have been infected that when opened infect the whole computer. These people engage in irregular activities. For the residents

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now