blog




  • Essay / Mobile Device Threats and Vulnerabilities - 1303

    With the increasingly ubiquitous nature of mobile devices and their availability online, including smartphones and tablets, there is also understandable concern about the level of security afforded to these devices. This can be seen as increasingly important given the proliferation of policies such as BYOD (Bring Your Own Device) which is being used by various organizations as a means of reducing the cost of owning such devices while still reaping the benefits flexibility that their use can offer. bring. This is therefore an area of ​​immense interest due to the changing and emerging nature of the technology itself as well as security concerns. Due to the sensitive and confidential information that would exist on such devices, it is imperative that security solutions and processes be implemented to protect and secure this content against the proliferation of threats and vulnerabilities that can affect mobile devices (Juniper Networks, nd). Mobile devices are being exposed to a record number of security threats, with potentially alarming statistics showing a 400 percent increase in Android malware for example, while Wi-Fi connections are also increasingly being targeted. Although conventional desktop computers will continue to serve important functions at both the consumer and business level, mobile devices are expected to become the predominant means of accessing personal and business content. It is understandable that cybercriminals have started to focus on mobile devices. which have at the same time expanded their user base while significantly consolidating operating system variants, making the potential attack surface considerably larger (...... middle of paper ..... .com/icloud/find-my-iphone.htmlhttp://www.google.com/android/devicemanagerSujithra, M. and Padmavathi, G. (2012). mobile devices and their defense mechanism International Journal of Computer Applications. Sujithra, M. and Padmavathi, G. (2012). , G. (August 8, 2013). Exploiting vulnerabilities: the other side of mobile threats. side-of-mobile-threats/Wright, J. (2014). Five wireless threats you may not know about. Retrieved from SANS: http://www.sans.edu/research/security-laboratory/article/wireless-security-1