logo

Mobile Security Deals Information 2022

   

Added on  2022-09-22

17 Pages3549 Words27 Views
Running head: PROPOSAL
Major issues associated with the online mobile security
Name of Student
Name of University
Author Note

1
PROPOSAL
Preface
Mobile security deals with the protection of mobile devices which include tablet, laptop,
computing devices and other network. Mobile security is related to wireless security. Mobile
security is increasingly important in mobile computing as malwares are becoming increasingly
sophisticated. This particular study aims in analysis of the major issues linked with online mobile
security. Investigation of the major security issues linked with online mobile security is essential
to eliminate the threats that can risks the data privacy of the users. The report proposes a
technique of investigating the major issues linked with online mobile security so that methods for
eliminating those issues can be identified. A process in which the reach study will be carried out
and the methods to be used are elaborated in this report. The study proposes the use of both
primary data and secondary data to investigate the major security issues linked with the online
functionalities of mobile devises.

2
PROPOSAL
Table of Contents
1. Introduction......................................................................................................................3
2. Purpose/Significance.......................................................................................................4
3. Literature Review............................................................................................................4
3.1. Online Mobile Security.............................................................................................4
3.2. Issues Associated with Online Mobile Security.......................................................5
4. Methodology....................................................................................................................7
5. Implication and Contribution to Knowledge.................................................................10
6. Research Schedule.........................................................................................................11
7. Budget............................................................................................................................11
References..........................................................................................................................13

3
PROPOSAL
1. Introduction
Over the last few years, there have been an increasing use of mobile devices to carry on
with major and essential functions like banking, online (Wushishi and Ogundiya 2014). Recent
advances in the field of technology allows an user to make usage of mobile devices life
smartphone and tablets to make online monetary transaction, save confidential data or to send
important business data to other individuals (Isaac and Sherali 2014). Thus, protection of
security and confidentiality of the mobile devices becomes a necessity. The increasing risks on
the mobile devices harnesses the necessity of investigating the key issues associated with online
mobile security.
Data leakage, improper session handling, phishing attacks, network spoofing are few of
the most prominent issues in mobile security (Yuan et al. 2016). The report proposes the
methods, tools and techniques to be used to identify the major issues linked with online mobile
security. For this study, the researcher proposes the use of both secondary and primary data. The
secondary data will be obtained by the method of literature review. An evidence of a preliminary
review of literature review is indicated in this report. The report further proposes the techniques
to be considered for data collection and for investigation of the collected data. A quantitative
research design is proposed to undergo statistical analysis of the collected data.
In the following paragraphs, the purpose and significance of investigating the major
issues associated with the online mobile security is discussed. A preliminary literature review is
undertaken to identify the major threats linked with mobile security. The methodology section
proposes the tools to be used carrying out the study and to identify the issues that online mobile
security can face or is facing.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Abstract Proposal Research 2022
|14
|3614
|28

Secured Architecture for BYOD Devices
|57
|13641
|70

Discussion on Further Research
|3
|596
|323

Mobile Device Insecurities and Vulnerabilities
|9
|1641
|120

HI6008 Assignment 2 Requirement
|12
|2755
|166

Advantages and Disadvantages of IoT
|14
|3681
|54