Verified Document

Mobile Devices Security Essay

¶ … virtual environment has become more and more populated with devices and mechanisms that allow people to become increasingly more mobile. There has been a constant increase in the way in which people tend to act in their day-to-day activities by using their personal computers, laptops, tablets, mobile phones and all kind of technology developments that allows them to be in contact with the rest of the world by the touch of a button. These advancements however also determined an increased need for protecting these devices from cyber crime and threats that are no longer traditional and attackable with traditional means of action. More and more often, challenges related to the protection of information that is being transferred via the internet make the subject of research and technological improvements. There are several ways thru which security of mobile devices can be achieved or insured. On the one hand, there is the physical security of personal devices such as the mobile phone. More precisely, currently there are services offered by providers of mobile services that allow for payment of insurance for loss of phone. Indeed, this aspect relates to the replacement of the device; yet, such offers are doubled by technological improvements of software that allows for the clear and up-to-date...

Parts of this document are hidden

View Full Document
svg-one

An example in this sense is the service provided by Apple Inc. that allows the registration of all Apple devices on iCloud. In this way, all registered devices under a single iCloud account can be tracked down thru the Internet. This applied to the mobile phone allows the owner of the phone to report the device as being lost and localized once the respective device is connected to a wireless connection. The Apple application "Find my phone" therefore allows the device to be localized whether it has been stolen or just misplaced. Further, this application permits the owner of the iCloud account to remotely delete the content of the phone, if suspected of being stolen in order to allow a protection of the data stored on the phone. This example points out a mere functionality of a developed application that is enabled to cater for a basic security need.
On the other hand, there are other more complex security considerations which demand more complex resolutions. Statistics have pointed out that the corporate world is using extensively the mobility such devices provide to its employees in particular. More precisely, "Extensive use of mobile devices connecting to corporate networks - 89% have mobile devices such as smartphones or…

Sources used in this document:
Reference

Dimensional Research (2012) The Impact Of Mobile Devices On Information Security: A Survey Of It Professionals. Available online at http://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report.pdf
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now