This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

MOBILE SECURITY in Computer Security Foundationss

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

MOBILE SECURITY in Computer Security Foundationss

MOBILE SECURITY

Computer Security Foundationss

For this research paper, I will be doing a research on mobile security. In the recent past, there has been a record increase in the number of mobile phones users accessing the internet. According to research, mobile access accounts for thirty percent of all data traffic on the intent today (Bitton, Finkelshtein, Sidi, Puzis, Rokach & Shabtai, 2018). Taxonomy. The mobile phones are being used to conduct critical processes such as online banking, accessing medical information and storage of critical information related to the user. This has turned them into a key target for attackers as they try to gain access to this information. The main reason for the increasing number of attacks on mobile phone users is due to the unsuspecting nature of the users. Most users feel that since they own the mobile phones and keep them in their possession at all times, the probability of being attacked is minimal.

While this might be true, the number of mobile phone attacks is increasing at an alarming rate. As the number of mobile phone users is predicted to be more than six billion by 2021, there is a need to formulate security policies that will ensure that these devices are effectively protected (Choo, Rokach & Bettini, 2016). The first approach to protecting mobile devices is by identifying the root cause and source of these attacks. Often, mobile phone attacks involve social engineering or phishing attacks. Mobile phone users often receive emails from their employers of family members. Attackers have taken advantage of this trend and created emails that falsify the user’s employer or family member.

Unlike a desktop computer, the user must first open the email to view its contents. When the user opens the infected email, the attacker immediately installs malware into the mobile phone and takes control of its contents (Lalande, Viet Triem Tong, Graux, Hiet, Mazurczyk, Chaoui & Berthomé, 2019). Similarly, due to the sense of security that is created by the portability of mobile phones, users often use simple passwords or sometimes, do not protect their phones using passwords. The attacker therefore targets the phone and by using simple data such as the birth data of the user, gains access to the mobile phone and accesses the information in it.

In this research paper, I will indicate that there is a need to create security measures that will ensure the security of mobile devices. One approach that will highlight and expound more on is the creation of user awareness. Most users are attacked without even being aware that they are being attacked. This is mainly due to the portability of mobile phones that creates a false sense of security. Mobile phone users need to be made aware that despite the portability of the phones, they are at more risk of being attacked as any desktop or personal computer user (Lau, 2017). The research will take a qualitative and quantitative approach by analyzing previously done researches and current data on the number and causes of mobile phone attacks that have been recorded by Kaspersky. By analyzing this data, I will create a section of proposed solutions that will serve to help users to effectively protect their phones from attacks.

 

 

 

 

 

 

 

 

 

References

Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L., & Shabtai, A. (2018). Taxonomy of mobile users’ security awareness. Computers & Security, 73, 266-293.

Choo, K. R., Rokach, L., & Bettini, C. (2016). Mobile security and privacy: Advances, challenges and future research directions.

Lalande, J. F., Viet Triem Tong, V., Graux, P., Hiet, G., Mazurczyk, W., Chaoui, H., & Berthomé, P. (2019, February). Teaching android mobile security. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (pp. 232-238).

Lau, L. (2017). Mobile Security: End Users are the Weakest Link in the System. In Mobile Security and Privacy (pp. 57-66). Syngress.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask