MOBILE PLATFORM VULNERABILITIES
By
[Name of Student]
Course
Professor
[Name of the institution]
April 24, 2020
Mobile platform vulnerabilities are basically the most focused threats to the IT world today. Mobile devices are hacked and steal personal information by using different but modern and advanced hacking tools. It is one of the merging threat to the digital world, for this purpose, mobile companies like Apple Inc. Samsung etc. are investing a lot on R&D just to enhance the security protection of the mobile device and eliminating the vulnerability effect from the mobile devices. For this purpose, we need information compliance policy, which is basically an essential tool to keep the whole organizational network safe by inducing modern and advanced technology in an effective and efficient way (Rondeau, 2014). In order to protect the confidential information, certain quality standards need to implement in terms of anti-virus, cloud technology so that it stops the malware at the surface and protect the network successfully. There are kind of mobile platform vulnerabilities emerged through which these devices could be harmed illegally. These are as follows:
Malicious Software
malicious software that we can’t afford to have on our mobile or computer devices because they ruin the whole system adversely. The virus can be of different types, which creates a disturbance in the system in such a way it becomes more complex for the data administrators to retrieve or repair the system successfully. They either come from phishing e-mails which affect the entire mobile device by having wrong entry into the system and steal the private information of the organization successfully.
Phishing Attacks
These are kind of cyberattacks come through phishing e-mails, SMS, etc. When we open these e-mails or SMS, it would create an immediate attack to the mobile device and maybe a source of steal private information.
Unsecured Wi-fi
Unsecured Wi-fi is the most dangerous threat to the mobile device because it directly creates a disturbance to the mobile and steals important information, e-mails, photos, videos that could be leaked through this unsecured wi-fi.
References
Rondeau, L. (2014). Mobile Device Vulnerabilities and Securities. Digital Communications and Information Security.
Rabbani, Mahdi. (2017). A Survey on Smartphone Security: Software Vulnerabilities, Malware, and Attacks. International Journal of Advanced Computer Science and Applications.