Wednesday, May 6, 2020

The Impact of Mobile Devices on Cyber Security - 1132 Words

The Impact of Mobile Devices on Cyber security: The modern society including corporate environments has been characterized by the proliferation of mobile devices. The increased use of these devices is attributed to the significant opportunities they bring and their contribution towards enhanced communication. However, the increased use of mobile devices has been accompanied by considerable concerns regarding the privacy of personal information and sensitive corporate data that are stored on them. In essence, mobile devices have significant impacts on cyber-security because the type of data stored and accessed on the devices contributes to heightened security risks. Despite the significant benefits associated with the increased use of†¦show more content†¦These organizations have justified their actions by citing the proliferation of personal devices in the past few years. Consequently, there are twice as many personal devices in the working environment as compared to se veral years ago. While the increased connectivity of personal devices to corporate networks has some advantages, the trend has increased security risks and cyber attacks. Actually, in the past few years, more than 60 percent of workers in organizations allowing connectivity of personal devices to corporate networks have reported an increase in security threats and cyber attacks on the organizations (â€Å"The Impact of Mobile Devices on Information Security†, 2012). These individuals have stated that most of the security risks and cyber attacks have been brought by the use of mobile devices in corporate networks. Lack of Awareness and Carelessness: The second major way through which the increased use of mobile devices contributes to more cyber security issues is through lack of awareness of and carelessness regarding the impact of mobile data on security. While organizations continue to allow workers to connect mobile devices to corporate networks, most of these workers remain unaware of the probable risks that mobile devices poseShow MoreRelatedSecurity Risk Associated with Mobile Devices1429 Words   |  6 Pagesï » ¿ Security Risk Associated with Mobile Devices The term mobile devices are not limited to cellphones; they include iPads, iPods, Laptops, PDAs and e-Readers. These devices act as a lifeline to the outdoor world, and are frequently used for navigating, social networking, shopping, banking and business purposes. What is often forgotten about these devices is that they are gateways to hackers. â€Å"Mobile devices can be used by a hacker as an access point into many other aspects of your digital lifeRead MoreWireless And Mobile Security Plan1584 Words   |  7 PagesRunning head: WIRELESS AND MOBILE SECURITY PLAN Wireless and Mobile Security Plan Patrick C. Behan Regis University Context:  Our networks are becoming more vulnerable because of wireless and mobile computing. Ubiquitous devices can and do pose a significant vulnerability. In this activity, you are to think outside the box and determine how to best defend against these threats. Scenario - You are an Information Security engineer for a midsized company. The company would like to offer directRead MoreModel Device Security to Keep Ones Data Safe687 Words   |  3 PagesApproach Considering a person’s personal data is one, if not the single most important assets he or she is in possession of, the processes involved in keeping the said data safe is crucial to avoid being a victim of malicious activities. Mobile device security should be at the top of a person’s list as a form of protecting personal data from the outside threats of malicious code infection, unauthorized data access, identity theft, fraud, and a compromise in the confidentiality, integrity and availabilityRead MoreEmerging Technologies That Impact The Cybersecurity Field1311 Words   |  6 Pagesand the dynamic nature of cyberspace has stimulated the development of technologies that can exploit this domain. This paper researches various emerging technologies that impact the cybersecurity field. The emerging technologies that are discussed in this paper are based on advances in information systems, computing, and security. Each emerging technology that is discussed in this paper is explained thoroughly, including information on its characteristics and possible usage. Additionally, furtherRead MoreTechnological Innovations Are Transforming Almost All Industry1267 Words   |  6 Pagestechnologies to refine business processes and improve customers’ satisfaction. Furthermore, insurance companies must evaluate how technological trends will impact the growth of their businesses and harness their potential to gain sustainable competitive advantage and support growth initiatives (Cameron, 2015). The paper argues that cyber security, mobility and big data and analytics are technological forces that will change the future of insurance industry by forcing insurers to change the way theyRead MoreSecurity for Our Mobile Devices849 Words   |  3 Pagesof a mobile device being compromised by an attacker range from small to huge depending on the level of severity the impact that has on the intended recipient. Some examples include but are not limited to; person al and professional data being removed, operation of the device being rendered unusable, total battery discharge, stealing of user’s identity, recording of conversations, and manipulating smartphones to act as zombie machines. Assumptions Some common assumptions in mobile device securityRead MoreTaking a Look at Mobile Risk Management708 Words   |  3 Pagesthat are associated with mobile devices. Mobile Risk management is way beyond traditional management of mobile device where they were primarily working on control tactics and on risk avoidance. The MRM is done to allow their full potential of mobility to exercise while ensuring regulatory compliance and protecting corporate data. In order to achieve accurate balance among risk mitigation, compliance assurance and device management and simultaneously maximizing utility of device and user acceptance thatRead MoreCyber Bully And What Do Cyber Bullies Look For A Target?1457 Words   |  6 PagesWhat factors are associated with an increased tendency to cyber bully and what do cyber bullies look for in a target? Aschah Williams David Johnston Emily Crawford Jaime Skipper Kiera Smith BHCLR â€Æ' What factors are associated with an increased tendency to cyber bully and what do cyber bullies look for in a target? Cyber Bullying is a relatively new method of harassing and intimidating peers. It’s difficult to target because as few as 1/10 parents realize that their children are participatingRead MoreWhen Cybersecurity Policy Is Discussed The Topics Often1145 Words   |  5 Pagescybersecurity policy is discussed the topics often focus on technology, corporate culture, and security awareness. The success of an organization in defending its most valuable asset, data, depends on the proper implementation of several security practices. Ensuring that the â€Å"human aspect† of cyber security is addressed is vital, for the culture of an organization can greatly impact both the security posture and defense of information networks. This paper addresses the human aspects responsibleRead MoreBullying, Online Predatory Action And Identity Theft1285 Words   |  6 PagesWith the increase in technology in schools and at home, teacher need to be more aware and have more knowledge on cyber safety. Cyber safety includes many elements including; bullying, online predatory action and identity theft. With the rise of technology online bullying is becoming an ever-growing problem. This is because it not only allows for a student to be bullied at school, but can also be taken home as well. Online bullying can have many negative effects including; depression, anxiety and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.