logo

Information Security Management in PDF

   

Added on  2022-08-21

9 Pages2314 Words11 Views
Mobile Development
 | 
 | 
 | 
Running head: INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT
Name of the Student
Name of the University
Author Note
Information Security Management in PDF_1

INFORMATION SECURITY MANAGEMENT
1
Table of Contents
Introduction......................................................................................................................................2
Security Threats and Potential Vulnerabilities................................................................................2
Strengths and Weakness of the cryptographic elements..................................................................4
Literature review..............................................................................................................................5
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
Information Security Management in PDF_2

INFORMATION SECURITY MANAGEMENT
2
Introduction
The mobile application and web based applications are becoming standardized in the
current market. Beginning of the end-to-end encryption and MACs with multi factor
authentications have brought change in the general awareness of independent security and
privacy practices. This paper discusses the capability of the attacks on a system having security
threats and vulnerabilities. Digital evidence examined and tested from smartphone can provide
effective information that are criminal in nature. In the current world, the messaging applications
are widely used technology which has become an important component of security and privacy
(Zhu et al. 2014). The paper also describes the cryptography element along with their strength
and weaknesses. In this work, the results of a test of over 20 applications are discussed based on
the android devices along with iPhone’s tethering issues. The digital forensic is a methodology
to trace the vulnerabilities f a device or network. In the later section of the paper, it is concluded
with the overview of the security threats and their preventions.
Security Threats and Potential Vulnerabilities
Replay attack: Any system, having potential vulnerabilities and loopholes can attract hackers. A
replay attack is one of the type of attacks done by the hacker which replay the messages between
two parties. From the receiver end, the replay messages seems to be an act of the sender by
mistake. However it does not decrypt the messages which were shared between the two parties.
Whereas the body of the message is changed by the attacker to obtain information from the user
ends. The messages are designed in way that it passes the protocols and firewalls of the system
9Costa-Pazo et al. 2016). The system accepts the message and the user implants the attack by
themselves by receiving the messages. End-to-end encryption is protocol that prevents the replay
Information Security Management in PDF_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Tools Report
|7
|1141
|38

Exploiting Research Vulnerability
|3
|1367
|380

Information Technology Security
|13
|3820
|443

Data Encryption Standards for WiMAX Networks
|6
|928
|23

(Sample) The Onion Routing
|6
|1617
|106

COIT20262 Assignment 1 Submission
|7
|1565
|52