Analyzing the Impact of Mobile Devices on Cybersecurity Research Paper

Total Length: 972 words ( 3 double-spaced pages)

Total Sources: 2

Page 1 of 3

Mobile Devices on Cybersecurity

One of the most important aspects of our current age and the rapid pace by which technology has developed has a direct connection to the development and use of smartphones. The first smartphones were just capable of allowing one to check one's email on one's phone: nowadays smartphones appear to be bounded by nothing. They are razor-sharp and razor fast tools for offering up efficient and convenient means of accessing information. However, given these abilities and trends of these phones, they are still vulnerable to cyber attacks. "Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installed security software. This lack in security is an opportunity for malicious cyber attackers to hack into the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditional security software found in personal computers (PCs), such as firewalls, antivirus, and encryption, is not currently available in smartphones. Moreover, smartphones are even more vulnerable than personal computers because more people are using smartphones to do personal tasks" (Wright et al., 2012). For instance, smartphone users often do their banking online and make purchases online, along with engaging in monetary transactions, such as purchasing goods, redeeming coupons and processing payments: these are all the types of transactions that are particularly vulnerable to cyber attacks because the hacker can ultimately get through to the bank account information.

Thus, because of this widespread use and the fact that mobile phones are so small and so easily transportable, and given the popularity of doing business with these phones, there need to be more policies in place to protect such sensitive personal data.

One policy that needs to be developed and put in place exclusively for mobile phone users are educational ones. Just as one has to be educated about the number of minutes one is able to use and other details related to the cell phone contract, one also needs to be cognizant of scams designed particularly for mobile phones.

Stuck Writing Your "Analyzing the Impact of Mobile Devices on Cybersecurity" Research Paper?

Programs in place which stress the education of all users about these threats are an absolute necessity. "A common one offers a free iPad to persuade you to subscribe to products or services, which turn into pricey subscriptions. As you do with email, independently verify the validity of any offer before you take any other action" (rbc.com). Similarly, users need to be educated about the process of buying and downloading new apps; users need to be taught the necessity of being loyal to reputable sources to help ensure that there is no unwanted and malicious software concealed within the new application.

Moreover, users need to be aware of the privacy settings that are in place on their mobile devices to verify that one is aware of the permissions that are being allowed, along with the applications that are being upgraded as well to ensure that one does not….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Analyzing The Impact Of Mobile Devices On Cybersecurity" (2014, February 06) Retrieved April 19, 2024, from
https://www.aceyourpaper.com/essays/analyzing-impact-mobile-devices-cybersecurity-182263

Latest MLA Format (8th edition)

Copy Reference
"Analyzing The Impact Of Mobile Devices On Cybersecurity" 06 February 2014. Web.19 April. 2024. <
https://www.aceyourpaper.com/essays/analyzing-impact-mobile-devices-cybersecurity-182263>

Latest Chicago Format (16th edition)

Copy Reference
"Analyzing The Impact Of Mobile Devices On Cybersecurity", 06 February 2014, Accessed.19 April. 2024,
https://www.aceyourpaper.com/essays/analyzing-impact-mobile-devices-cybersecurity-182263