Final Term Paper : Mobile Security By: Sibbonai Carswell 9/14/2013 RES/531 Mobile phone usage is at its highest right now. I know personally if I don’t have my cell phone I feel like I am missing my closet accessory. I do everything from my phone talk, text. Check email, pay bills, check my bank account, send money, receive money etc. Since so many different things are done on cell phones, mobile security has become a big issue. The subject of mobile computing is extremely important to me because of my background in IT I have a Bachelors Degree in IT as well as I am pursing my masters in Network Engineering. The world has changed significantly in their use of technology a few years back everyone had a laptop and that was …show more content…
Attackers can exploit vulnerabilities in outdated software. Wireless transmissions are not always encrypted, making information sent via mobile devices easier to intercept. One of the main reasons this is a problem is because most businesses now use smartphones as a communication device. Hackers are targeting 3 things on the cell phone data, identity and availability. A compromised phone can be vulnerable to several different attacks. The portability of mobile devices allows for continuous access to business and personal information, regardless of location. This portability also leads to the very common incidence of loss or theft of mobile devices. In fact, one survey of consumer users found that one out of every three users has lost their device4 at some point in time. These lost devices can present a plethora of devastating consequences. Not only is the device at risk, but bookmarked bank accounts with passwords set to auto-complete in the browser, contacts with pictures and addresses tied to the contact, calendar events, social media accounts, personal photos, pre-connected email accounts, and other data can also be jeopardized. Mainly because people are using their mobile devices for work related functions, the loss of a mobile device can also present devastating business implications, exposing intellectual property, sensitive employee and customer information, and a host of other corporate assets. Communication interception is a threat to any device
The inappropriate disclosure or misuse of sensitive information by an employee may result in financial considerations and legal consequences for an organization. “Mobile devices provide all kinds of new scenarios for business data to go missing, be shared with others, or be stolen. You need to go into BYOD thinking this way, not just for everyday activity, but also when employees move on from your organization” (Arnold, n.d.).
This article gives a synopsis of threats to the mobile devices and the data existing in them and the available defenses. It classifies seven different types of threats on mobile devices and then it discusses about the precautions that can be taken to avoid these threats. It recommends how to prioritize the different threats and defenses.
The use of mobile devices has become so commonplace today that you can hardly step out your front door without them. We have become tethered to technology. Our dependence upon this technology is not the problem, how and where we choose to use it is.
The rapid growth of mobile devices offers health care providers a convenient and simple way to communicate and access medical records. They are vulnerable to theft and loss due to the size and portability which makes the opportunity for thieves to take devices that are highly visible. “The most common form of security breach is the theft of mobile devices” (Barrett, 2011, Para 3). The Security Rule specifies covered entities to be held accountable for the actions of their employees.
Mobiles phones and tablets are lost or stolen quite easily leading to compromise on PHI.
Technology is all around us. Almost every person in the country owns some form of technology. Whether it’s a television, a computer, a laptop, or a smartphone most Americans own at least one of them. People use their phones for business and personal uses. There is so much information is on your phone. You may think that, that information on your phone is safe, but you are wrong.
In today’s society, the use of mobile devices has taken over our lives in every way possible.
Cell Phones are now a part of our everyday life. This is a fact for just about every modern American. We use them to capture family moments, schedule appointments, handle finances, and listen to our favorite bands. We have all this information on our cell phones, and companies like Apple and Google are fighting to keep this information secure from prying eyes.
Today’s technology-based society is plagued with an over abundance of mobile devices. These devices now control our homes, our transportation, and our
Many companies in United States and around the world have started to worry about the iPhone usage and how much they are becoming dependent by organizations in order to conduct their business. Landman (2010) stated, “The threat from accidental or malicious misuse by employees is a significant threat to business” (p. 14). For this reason, using an iPhone in the workplace is putting companies on alert because the owner of the iPhone can store volatile information about their place where they work. Any information about the company such as e-mails, photos, and other digital evidence used in the work place could be sent to their competitors and used against the company itself and these are real life dangers in the corporate world.
Security issues with wireless technology also continues to rise, 50% of smartphones were returned even though all of them contained owner contact information, and 75% of smartphones owners do not password protect their phones (2012 Info-graphic Highlights).
Phones hold critical information such as: addresses, phone numbers, pictures, account information and much more. Mobile phones are considered high risk when it comes to information leakage. According to Forbes , Six of the worlds seven billion people have mobile phones with access to the internet. Cyber attacks can happen at any time and any place, even from the comfort of your own home. Malware, (which is a software that is intended to damage or disable computer systems) is now an easy detection for most computer security
Attention Getter: Other than our car keys, our mobile devices have become something that we can’t leave the house with. This includes our smartphones, laptops, tablets, USBs, and digital cameras.
According to the U.S. Department of Homeland Security in the article Cyber Threats to Mobile Phones, phones are now sharing hardware and software similar to a PC and becoming each time more like a PC. Therefore, the risks of being hacked are increasing, allowing hackers to attack mobile devices the same way as if they were doing it with a regular PC. Personal and professional information are more often stored on mobile devices therefore it is imperative to have our data secure. Security solutions for mobile devices are not as broad or high-tech as those for PCs. The majority of mobile security relies on the proper use and smart choices that the user makes on a daily basis to be protected against cyber attacks. Even the most careful person can be attacked but the possibilities of that happening are less when you are proactive.
Mobile computing has infiltrated every area of our planet and personal lives. We have become so dependent upon our mobile devices they are often referred to as our third limb. Regardless of race, color, creed or location, mobile technology has shrunk the entire world into the palm of our hands. Mobile technology has made research, communication with our friends and family, education, entertainment and even banking possible to do on the go.