Verified Document

Mobile Devices On Cyber Security: The Modern Essay

¶ … Mobile Devices on Cyber security: The modern society including corporate environments has been characterized by the proliferation of mobile devices. The increased use of these devices is attributed to the significant opportunities they bring and their contribution towards enhanced communication. However, the increased use of mobile devices has been accompanied by considerable concerns regarding the privacy of personal information and sensitive corporate data that are stored on them. In essence, mobile devices have significant impacts on cyber-security because the type of data stored and accessed on the devices contributes to heightened security risks. Despite the significant benefits associated with the increased use of mobile devices, they generate new cyber security issues including heightened financial risks, loss of company data, and non-compliance issues.

Increased Use of Mobile Devices:

Mobile devices have become attractive platforms for communication in today's society to an extent that they are increasingly used for storing and accessing personal information as well as company data. The increased use of the devices has been enhanced by the adoption of near field communication for mobile payment services, particularly in business. As a result, people and businesses not only rely on these devices for communication purposes but also use them for monetary services. Actually, it is estimated that the use of mobile devices will continue to grow in the future for various purposes.

However, the increased use of the devices is also accompanied by significant cyber security threats because of the type of information stored on and accessed from the devices. Generally, the increased use of mobile devices in the future will be accompanied by an increase in the volume of attacks that are targeted to the devices (Smith, 2012). Smart phones, tablets, and other mobile devices are associated with increased cyber security issues because they provide another element of a probable cyber attack. Some of the various ways with which these devices contributed to increased...

Notably, there is a probability of downloading programs or applications that spy on text messages and phone calls. The emergence of these applications is attributed to the fact that hackers are rapidly learning how to collect legitimate applications and repackage them into malicious programs before selling or providing them through various ways to innocent users (Smith, 2012). With regards to the use of these devices for company data, the major cyber security threats include increased financial threats, loss of company information, and non-compliance issues. These issues have particularly been enhanced by the ongoing universal adoption of social media for personal and business purposes and activities. Moreover, the cyber security issues in the corporate world due to the use of mobile devices are fueled by easy access to corporate networks and social media platforms.
Mobile Devices and Cyber security Issues:

As evident in this discussion, mobile devices pose a triple threat to privacy of personal and company information because they are used for personal and business purposes. The increased use of these devices in the future will not only be dangerous to cyber security but will also make cyber attacks become more advanced and widespread. The main impact of mobile devices on cyber security is that it contributes to more security risks in the corporate world. Due to this trend, the modern business environment is characterized by significant security threats and attacks. Some of the major ways through which increased use of mobile devices enhances security risks include & #8230;

Connectivity to Corporate Networks:

Since mobile devices have become common communication…

Sources used in this document:
Reference:

Ayrapetov, D. (2013, February 8). Cybersecurity Challenges in 2013. Retrieved February 8,

2014, from http://www.techrepublic.com/blog/it-security/cybersecurity-challenges-in-2013/#.

Smith, T.D. (2012, January). Cyber Security Emerging Trends and Threats for 2012. Retrieved

from New York State Division of Homeland Security and Emergency Services website: http://www.dhses.ny.gov/ocs/awareness-training-events/news/2012-01.cfm
Research. Retrieved February 8, 2014, from http://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Security
Words: 1691 Length: 5 Document Type: Research Paper

Fundamental Challenges With respect to cybersecurity, there are two fundamental challenges – technological and human. On the technology side, many firms underinvest in cybersecurity, for whatever reason. It can be difficult to keep up with evolving threats, such as new ransomware, and companies that lack modern cybersecurity technology are especially vulnerable. In particular, companies are often keen to adopt new technologies – today cloud computing and the use of personal mobile

Financial Institutions and Cybersecurity
Words: 1576 Length: 5 Document Type: Research Paper

Cybersecurity for Mistral Bank Mistral Bank is one of the global financial services company headquartered in the United States where it is the third-largest bank holding firm and fourth-largest in assets held by deposit and market capitalization respectively. Since its inception, the company has experienced tremendous growth and profitability to an extent that it currently serves customers in over 40 countries and has significant relationships with U.S. Fortune 500 and Fortune

Report on a Cyber Security Firm Verizon
Words: 1539 Length: 5 Document Type: Research Proposal

Verizon ReportAbout VerizonIn 2000, Verizon Communications Inc. had been formed and led in offering communication and technology services. It has its headquarters in New York. Verizon specializes in data, voice, and video services. It offers network solutions by responding to customers' demands and providing secure connections and control features. Verizon is also a player in fixed wireless connection and mobile computing. Besides, it was the first company to launch mobility

Technology Issue in Information Assurance
Words: 3012 Length: 10 Document Type: Term Paper

S. Department of Defense (DOD) uses over two million computers and more than ten thousand local area networks, most of which are linked to, and vulnerable to attack from, users of the larger Internet. (2008, p. 276) These increasing threats correspond to the growing reliance on information systems to manage the entire spectrum of modern commerce and energy resources, making the disruption of a single element in the integrated system a

Cyber Forensics and Legal Considerations
Words: 3240 Length: 11 Document Type: Term Paper

Cyber Forensics and Legal Considerations: Is the Law Keeping up with Advancing Technology? Introduction Because of the digital age and the possibilities it has introduced, digital forensics is now a necessity within the realm of law enforcement. However, there are numerous considerations to be made within this realm: constitutional law, property law, contract law, tort law, cybercrime, criminal procedure, evidence law, and cyber war. This paper will examine how the law is

Canadian Policies to Thwart Terrorist and Criminal
Words: 3624 Length: 11 Document Type: Research Paper

Canadian Policies to Thwart Terrorist and Criminal Activities Canadian Policies to Combat Crime and Terrorism Problems being faced due to Cyber-Crime in Today's World What is Identity Theft? How and Why Cyber-Crime Occurs? Why Cyber-Crime has become an Important Issue? How Release of Personal Information makes an Individual vulnerable to Identity Theft? Future Implications Since time immemorial, crime and criminal activities have been found at an accelerated pace, however, with the penetration of the world into the twenty

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now