This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

MOBILE PLATFORM VULNERABILITIES

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

MOBILE PLATFORM VULNERABILITIES

 

By

[Name of Student]

 

 

 

 

 

 

 

 

 

 

 

 

Course

Professor

[Name of the institution]

April 24, 2020

 

 

 

 

 

 

Mobile platform vulnerabilities are basically the most focused threats to the IT world today. Mobile devices are hacked and steal personal information by using different but modern and advanced hacking tools. It is one of the merging threat to the digital world, for this purpose, mobile companies like Apple Inc. Samsung etc. are investing a lot on R&D just to enhance the security protection of the mobile device and eliminating the vulnerability effect from the mobile devices. For this purpose, we need information compliance policy, which is basically an essential tool to keep the whole organizational network safe by inducing modern and advanced technology in an effective and efficient way (Rondeau, 2014). In order to protect the confidential information, certain quality standards need to implement in terms of anti-virus, cloud technology so that it stops the malware at the surface and protect the network successfully. There are kind of mobile platform vulnerabilities emerged through which these devices could be harmed illegally. These are as follows:

Malicious Software

malicious software that we can’t afford to have on our mobile or computer devices because they ruin the whole system adversely. The virus can be of different types, which creates a disturbance in the system in such a way it becomes more complex for the data administrators to retrieve or repair the system successfully. They either come from phishing e-mails which affect the entire mobile device by having wrong entry into the system and steal the private information of the organization successfully.

Phishing Attacks

These are kind of cyberattacks come through phishing e-mails, SMS, etc. When we open these e-mails or SMS, it would create an immediate attack to the mobile device and maybe a source of steal private information.

Unsecured Wi-fi

Unsecured Wi-fi is the most dangerous threat to the mobile device because it directly creates a disturbance to the mobile and steals important information, e-mails, photos, videos that could be leaked through this unsecured wi-fi.

 

 

 

References

Rondeau, L. (2014). Mobile Device Vulnerabilities and Securities. Digital Communications and Information Security.

Rabbani, Mahdi. (2017). A Survey on Smartphone Security: Software Vulnerabilities, Malware, and Attacks. International Journal of Advanced Computer Science and Applications.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask