Mobile Devices Security Essay

Total Length: 849 words ( 3 double-spaced pages)

Total Sources: 1

Page 1 of 3

virtual environment has become more and more populated with devices and mechanisms that allow people to become increasingly more mobile. There has been a constant increase in the way in which people tend to act in their day-to-day activities by using their personal computers, laptops, tablets, mobile phones and all kind of technology developments that allows them to be in contact with the rest of the world by the touch of a button. These advancements however also determined an increased need for protecting these devices from cyber crime and threats that are no longer traditional and attackable with traditional means of action. More and more often, challenges related to the protection of information that is being transferred via the internet make the subject of research and technological improvements.

There are several ways thru which security of mobile devices can be achieved or insured. On the one hand, there is the physical security of personal devices such as the mobile phone. More precisely, currently there are services offered by providers of mobile services that allow for payment of insurance for loss of phone. Indeed, this aspect relates to the replacement of the device; yet, such offers are doubled by technological improvements of software that allows for the clear and up-to-date localization of one's device at almost any given time. An example in this sense is the service provided by Apple Inc. that allows the registration of all Apple devices on iCloud.
In this way, all registered devices under a single iCloud account can be tracked down thru the Internet. This applied to the mobile phone allows the owner of the phone to report the device as being lost and localized once the respective device is connected to a wireless connection. The Apple application "Find my phone" therefore allows the device to be localized whether it has been stolen or just misplaced. Further, this application permits the owner of the iCloud account to remotely delete the content of the phone, if suspected of being stolen in order to allow a protection of the data stored on the phone. This example points out a mere functionality of a developed application that is enabled to cater for a basic security need.

On the other hand, there are other more complex security considerations which demand more complex resolutions. Statistics have pointed out that the corporate world is using extensively the mobility such devices provide to its employees in particular. More precisely, "Extensive use of mobile devices connecting to corporate networks - 89% have mobile devices such as….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Mobile Devices Security" (2013, September 16) Retrieved April 27, 2024, from
https://www.aceyourpaper.com/essays/mobile-devices-security-96499

Latest MLA Format (8th edition)

Copy Reference
"Mobile Devices Security" 16 September 2013. Web.27 April. 2024. <
https://www.aceyourpaper.com/essays/mobile-devices-security-96499>

Latest Chicago Format (16th edition)

Copy Reference
"Mobile Devices Security", 16 September 2013, Accessed.27 April. 2024,
https://www.aceyourpaper.com/essays/mobile-devices-security-96499