This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Mobile Security

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

 

 

 

 

 

 

 

Mobile Security

 

Student’s Name

Institution

Date

 

 

 

 

 

 

Mobile security can be defined as the process of protecting mobile devices. It is the process where the manufacture can protect laptops and smartphones. The other term that can be used in this case is wireless security. It means that securing the mobiles is done using wireless security. The process of mobile security is something that helps almost everyone in society. Without mobile security, then, most people in society would be victims if cybersecurity. The other thing is that mobile security allows people to protect critical information on their mobile phones (Becher et al., .2011, May). For instance, one loses their phone in public places, and then it can be more comfortable for it being accessed by other third parties who will end up tampering with everything. They may also end up inflicting pain to the mobile phone user. And their close contacts. In recent years the use of mobile security has become important across the world. The number of mobile phones introduced into the industry has increased; many mobile operators are coming with different brands. There is, therefore, a need to come up with a strong security feature that will protect the information.

Consequently, it means that the number of people using mobile phones, in this case, will increase. This means that there will be rising cases of cybercrime; hence many people will be affected. The companies have therefore considered coming up with a more robust mechanism of securing the mobile phones form any harmful people or anyone that may try to hack the phones.

There are various reasoned for coming up with more reliable security practices. Of the critical aspects is that:

User authentication

One of the best ways for coming up with mobile security is that it helps in user authentication. User authentication we where one can be restricted from accessing the information in the phone through the use of passwords, screen lock, and the use of a personal identification number. These are the measure that is put in place the user, and they can be turned off anytime. In this case, the user will be required to get authentication before trying to access the phone (Decharms, 2015). The data on the phone is protected to help prevent any theft or accident that may lead to loss of information. It is, therefore, essential for one to come up with a strong password that can help one retrieve information.

Regular back up

Another key concern when thinking of mobile security is to regularly back up the data on the phone. One, in this case, needs to utilize encryption of the data that is stored on the phone. Backing up the data will help store key information in the event of loss or damage to the phone. One can make use of the utility app is backing up the data. The data will be backed up automatically in the sense that one can easily retrieve it.

Utilize encryption

Another key that needs to be considered in this case is the encryption of data. That data in the phone needs to be encrypted at all times using a secure VPN (Li & Clark, 2013). The other thing is that the use of a VPN helps one to protect the data or to transmit essential data while using a public connection.

 

 

 

 

 

 

 

 

References

Becher, M., Freiling, F. C., Hoffmann, J., Holz, T., Uellenbeck, S., & Wolf, C. (2011, May). Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices. In 2011 IEEE Symposium on Security and Privacy (pp. 96-111). IEEE.

Decharms, C. (2015). U.S. Patent No. 9,014,661. Washington, DC: U.S. Patent and Trademark Office.

Li, Q., & Clark, G. (2013). Mobile security: a look ahead. IEEE Security & Privacy11(1), 78-81.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask