Verified Document

Security For Mobile Devices Research Paper

Related Topics:

Security: Mobile Protection As the Internet has become the dominant means of communicating, sharing information, tending to business, storing data, and maintaining records in the Digital Age, the importance of security for the digital world has become more and more realized (Zhang et al., 2017). Not only do companies have to invest in digital security in order to safeguard against threats and risks such as hacking or malware, but individuals also have to be cognizant of the threats to their personal information and property now that all things are online. This is particularly important for people to consider given that so many individuals today carry around pocket computers in the form of a mobile phone—an iPhone, a smart phone, a tablet, an iPad—all of these devices require mobile protection as they can link up to and connect to the Internet wherever one goes (so long as one is within range of service, of course). Cybercriminals are ready and willing to attack one’s mobile devices to steal data, passwords, personal information, emails—anything that can be obtained through an unsecured network. For that reason, one must be extra cautious in today’s world.

One cannot expect, for example, free security apps to safeguard against all forms of malware. Zhou, Wang, Zhou and Jiang (2012) conducted an experiment in which they downloaded 204,040 apps from five different Android Markets in May-June 2011. Over the more than two hundred thousand apps they downloaded, there were 211 with malicious malware on them: 32 came from the official Android Market, or 0.02% of the apps were infectious and 179 of them came from other online marketplaces, with an infectious rate of around 0.35% overall. Thus, no matter where one is downloading one’s apps from, one should be aware that there is a risk of downloading an app that contains malware that can infect one’s phone, tablet or laptop and that can proceed to harvest information or control one’s computer. That risk may be lower than 1% but there is still a risk—and one should always be aware of the risks for the sake of security.

Best practices for downloading apps can be to review the app extensively before downloading it. But even that is not a surefire way, as many apps on Google Play have been found to be infected by malware in recent years (Bird, 2017). The Android model...

However, being wary of downloading an app that does not have any reviews or that has been reviewed negatively by almost all downloaders is not a sufficient method of protecting oneself from downloading a dangerous app. Although the Internet is full of information and people are always willing to share, taking a few moments to review what users online are saying about a specific app before taking the risk of downloading it does not provide a sufficiently sophisticated line of defense. Even if it is a popular app that has been downloaded many thousands of times by users, the risk of it containing malware may be lower—but this is not a good way of managing risk when it comes to safeguarding one’s mobile devices.
It is better to install malware detection on mobile devices to ensure that one is able to protect against attack—and not just guess about whether one is at risk (Zhou et al., 2012). Seo, Gupta, Sallam, Bertino and Yim (2014) show that one must use malware detection to protect information on mobile devices—otherwise one is simply not being safe: it is like driving without a seatbelt at 90 mph down an icy road in the dark of night without lights. Likewise, Ahmadi, Sotgiu and Giacinto (2018) show that IntelliAV, a system they developed, can act as a learning-based anti-malware.

Bird (2017) showed that of the many different types of malware found on Google Play, one of the worst was ExpensiveWall, which would send out text messages and charge people for services even if the person did not want them. At least 50 apps were discovered on Google Play to be infected with this malware. Delac, Silic and Krolo (2011) found that worms, Trojan horses and other viruses are commonly installed on phones via the downloading of harmful or infected apps.

Ways of protecting against infection are built-in to Android phones, which operate on a Linux kernel and use an isolation model (Delac et al., 2011), but this comes with its own issues and difficulties, as it reduces the effectiveness of an app. The shared user ID application permits mobile devices to share information, which makes them vulnerable to security threats, hacking, malware, spyware and so on. An iOS platform…

Cite this Document:
Copy Bibliography Citation

Related Documents

Mobile Device Security Factors and Implementation of
Words: 1765 Length: 6 Document Type: Essay

Mobile Device Security Factors and Implementation of Mobile Device Security Mobile devices have become ubiquitous and its usage is only going up from here. With such an extensive usage of mobile devices for personal and business use, its security becomes an important question. Most devices ado not have the security mechanism in place in the case of a theft, loss or intentional breach of the network and this makes the data present

Mobile Device Management Change Initiative Plan
Words: 1310 Length: 4 Document Type: Research Paper

Mobile Device Management Change Initiative Plan With the growing volume of content, number of applications and information accessed via various devices, Mobile Device Management (MDM) initiative is vital in the management of the mobile enterprise. MDM is more than the ordinary management of devices because it includes system-centered functionality to manage and secure applications and data. MDM is a crucial element of the device life circle, encompassing the device software, hardware,

Mobile Devices on Cyber Security: The Modern
Words: 1243 Length: 4 Document Type: Essay

Mobile Devices on Cyber security: The modern society including corporate environments has been characterized by the proliferation of mobile devices. The increased use of these devices is attributed to the significant opportunities they bring and their contribution towards enhanced communication. However, the increased use of mobile devices has been accompanied by considerable concerns regarding the privacy of personal information and sensitive corporate data that are stored on them. In essence,

Mobile Devices Security
Words: 849 Length: 3 Document Type: Essay

virtual environment has become more and more populated with devices and mechanisms that allow people to become increasingly more mobile. There has been a constant increase in the way in which people tend to act in their day-to-day activities by using their personal computers, laptops, tablets, mobile phones and all kind of technology developments that allows them to be in contact with the rest of the world by the

Mobile Devices Networking Performance and Security Related Issues
Words: 2206 Length: 7 Document Type: Research Paper

Abstract - With regard to security, the major issue is that most mobile devices are targets that are in line to face attacks. Mobile devices face a range of threats that capitalize on several susceptibilities usually obtained in such devices. Lack of encryptions is a major threat to security of mobile device networks. Information such as text messages and electronic messages that are sent using a mobile device are more

Mobile Devices in Hospitals to
Words: 3494 Length: 14 Document Type: Term Paper

Both of these devices "allow handwritten data entry including sketching with 'electronic ink' and handwriting recognition that converts scribble into typewritten text." (Wales and Zabrek, 2003) Full integration with hospital servers of these devices is required to realize the full benefits of these devices. These mobile devices "facilitate the entry of data for storage and processing at the servers. By storing hospital data on servers rather than on the mobile

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now