logo

Types of Threats Against Mobile Devices and Security Protection Techniques

8 Pages2120 Words79 Views
   

Added on  2023-01-11

About This Document

This document discusses the different types of threats against mobile devices and how these devices are vulnerable to destruction and abuse. It proposes and justifies two security protection techniques for mobile devices and explains how they can be used to mitigate threats. The document also describes how organizations ensure the availability of web service using a Linux server and identifies Linux auditing tools to monitor and analyze web server and email server problems.

Types of Threats Against Mobile Devices and Security Protection Techniques

   Added on 2023-01-11

ShareRelated Documents
Applied Project
1
Types of Threats Against Mobile Devices and Security Protection Techniques_1
Contents
INTRODUCTION...........................................................................................................................3
TASK 1............................................................................................................................................3
Describe about two types of threats against mobile devices. Identify that how devices
vulnerable to destruction and abuse.............................................................................................3
Propose and Justify two type of security protection technique for mobile device and how it can
be used to mitigate threats...........................................................................................................4
Describe that organization ensure the availability of web service by using Linux server...........5
Identify Linux auditing tools and understand that how it can be used by MBC firm to monitor
and analyse the web server and email server problems...............................................................5
TASK 2............................................................................................................................................6
Create two directories under main directory, consider both directories of students...................6
Demonstrate that create three users and identifying first name of student by using commands. 6
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8
2
Types of Threats Against Mobile Devices and Security Protection Techniques_2
INTRODUCTION
The assessment is designed to assess technical skills in investigating the information system
security, risk threat and management within organization. The documentation will describe about
the different type of threat against mobile identify and analyse that how devices vulnerable to
destruction and abuse. It will propose various security protection technique that always support
for providing the mobile device. Furthermore, the report will describe about the availability of
web service with the help of Linux server. However, identifying the various Linux auditing tool
to monitor and analyse the web server. In additional, it also identifying email server related
problems.
TASK 1
Describe about two types of threats against mobile devices. Identify that how devices vulnerable
to destruction and abuse.
As all hardware devices with an internet connection, there are wide range of threat to smart
device by using operating system. In the line with portable devices, various malicious software
industry is growing in both structural as well as technological terms (Alloghani and et.al., 2020).
Viruses and Spyware that can infect mobile devices. There are various type of security threat that
can affect mobile devices.
Malware: It is a type of software aimed at private specific information which directly
disturb users. It may cause breakdown of device. As a result, it causes information, documents
that belonging to user. Malicious software which infected the mobile phone and affects the entire
processing of system (Guarda and et.al., 2020). The malicious software which is not spread
themselves but large amount of size the device management and information. It directly targeting
the sensitive data that will be stored within Mobile phone.
Worms: it is counted among malware contain harmful and misleading instruction. It
directly affecting mobile device but do not require user interaction in proper manner. It is a type
of virus that affecting on the documentation file. The worm Penetrates by using vulnerability and
also integrated into running service within mobile device.
3
Types of Threats Against Mobile Devices and Security Protection Techniques_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybersecurity and Linux Web Server
|8
|1965
|82

Ways to Secure Mobile Devices and Linux Web Servers
|9
|2857
|100

Security and Risk Assessment for Mobile Devices
|11
|2676
|85

Security and Risk Management
|13
|3408
|76

Security and Risk Management in MBC Organization
|7
|2046
|37

IT Security and Risk Management: Threats, Malware, and Solutions
|17
|4012
|187