Method to Detect and Mitigate Data

Added on - 21 Apr 2020

  • 13

    pages

  • 2575

    words

  • 4

    views

  • 0

    downloads

Showing pages 1 to 4 of 13 pages
1Method to Detect and Mitigate Data Breach in Mobile Devices
2Table of ContentsAbstract............................................................................................................................................3Introduction......................................................................................................................................4Common Data Breaches in Mobile Devices....................................................................................4Spyware.......................................................................................................................................4Mobile Botnets.............................................................................................................................4Ad and Click Fraud......................................................................................................................5Dead Apps...................................................................................................................................5IoT Malware................................................................................................................................5Literature Review about Mitigate Data Breaches in Mobile Devices.............................................6Methods for detection of Data Breaches in Mobile Devices...........................................................7Conclusion.....................................................................................................................................10References......................................................................................................................................11
3AbstractThis report is based on the topic “method to detect and mitigate data breach in mobile devices”.Nowadays, issues of data breaching are increasing day by day for all IT users. Hacking,phishing, DDoS attacks and other cyber-crimes put bad influence on IT security and privacy. Theeducation, healthcare, business, banks and other sectors where IT applications are used, havealready encountered issues of data breaches. Not only desktop users but also mobile users arehighly influenced by IT frauds. Now hackers mostly attack on mobile devices because those areless secure and easy to access. Therefore, it is necessary to mitigate this issue of penetrating ofdata in mobile devices. Through this report, I will emphasize on some effective methods toachieve this goal.
4IntroductionThe detection and mitigation of data breaches in mobile devices is not an easy task. Someadvanced tools and techniques are required to use to get rid of this problem. However, beforestart discussion about mitigation of data breaches, it is important to discuss about commonlyencountered data breaches by users and how they put impact on their mobile devices. Afteranalysis, some essential data breaches are found related to mobile devices such as Spyware,Mobile Botnets, Ad and Click Fraud, Dead Apps and IoT Malware. In next segments of thisreport I would like to focus on these data violations in detail and also highlight methods toresolve this problem with literature reviews (Hamblen, 2017).Common Data Breaches in Mobile DevicesFollowing is detail discussion about data frauds in mobile devices:SpywareIt is one of the vulnerable data breaches in mobile devices. Spyware software is used byhackers to access corporate network, databases and computer systems. Moreover, it is also usedto find out ways to infect mobile devices. It is found by experts that this software can be operatedboth on iOS and Android devices. Pegasus is a common example of spyware that is used bycyber-criminals to hack iPhone or iPad for harvesting data (Doug Olenick et al., 2017).Mobile BotnetsToday, new malware has potential to convert hosts of mobile devices into botnet which iscontrolled by hackers and owner of mobile device does not have any knowledge about this. Thisis really dangerous that without any notice of mobile user his or her data is stolen by hackers.According to analysis it is found that the first target of botnets was Android devices (Porter,
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document