logo

Method to Detect and Mitigate Data

13 Pages2575 Words61 Views
   

Added on  2020-04-21

Method to Detect and Mitigate Data

   Added on 2020-04-21

ShareRelated Documents
1Method to Detect and Mitigate Data Breach in Mobile Devices
Method to Detect and Mitigate Data_1
2Table of ContentsAbstract............................................................................................................................................3Introduction......................................................................................................................................4Common Data Breaches in Mobile Devices....................................................................................4Spyware.......................................................................................................................................4Mobile Botnets.............................................................................................................................4Ad and Click Fraud......................................................................................................................5Dead Apps...................................................................................................................................5IoT Malware................................................................................................................................5Literature Review about Mitigate Data Breaches in Mobile Devices.............................................6Methods for detection of Data Breaches in Mobile Devices...........................................................7Conclusion.....................................................................................................................................10References......................................................................................................................................11
Method to Detect and Mitigate Data_2
3AbstractThis report is based on the topic “method to detect and mitigate data breach in mobile devices”. Nowadays, issues of data breaching are increasing day by day for all IT users. Hacking, phishing, DDoS attacks and other cyber-crimes put bad influence on IT security and privacy. Theeducation, healthcare, business, banks and other sectors where IT applications are used, have already encountered issues of data breaches. Not only desktop users but also mobile users are highly influenced by IT frauds. Now hackers mostly attack on mobile devices because those are less secure and easy to access. Therefore, it is necessary to mitigate this issue of penetrating of data in mobile devices. Through this report, I will emphasize on some effective methods to achieve this goal.
Method to Detect and Mitigate Data_3
4IntroductionThe detection and mitigation of data breaches in mobile devices is not an easy task. Some advanced tools and techniques are required to use to get rid of this problem. However, before start discussion about mitigation of data breaches, it is important to discuss about commonly encountered data breaches by users and how they put impact on their mobile devices. After analysis, some essential data breaches are found related to mobile devices such as Spyware, Mobile Botnets, Ad and Click Fraud, Dead Apps and IoT Malware. In next segments of this report I would like to focus on these data violations in detail and also highlight methods to resolve this problem with literature reviews (Hamblen, 2017). Common Data Breaches in Mobile DevicesFollowing is detail discussion about data frauds in mobile devices:SpywareIt is one of the vulnerable data breaches in mobile devices. Spyware software is used by hackers to access corporate network, databases and computer systems. Moreover, it is also used to find out ways to infect mobile devices. It is found by experts that this software can be operatedboth on iOS and Android devices. Pegasus is a common example of spyware that is used by cyber-criminals to hack iPhone or iPad for harvesting data (Doug Olenick et al., 2017). Mobile BotnetsToday, new malware has potential to convert hosts of mobile devices into botnet which iscontrolled by hackers and owner of mobile device does not have any knowledge about this. This is really dangerous that without any notice of mobile user his or her data is stolen by hackers. According to analysis it is found that the first target of botnets was Android devices (Porter,
Method to Detect and Mitigate Data_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Smartphones Security Issues and Mitigation Tools
|10
|706
|305

Cyber Security Laws and Regulations
|15
|5469
|290

Foundation of Cyber Security
|6
|1679
|89

Network security - Sample Assignment
|10
|2195
|122

Assignment on Trends in Cybercrime
|13
|3063
|21

Securing the Enterprise Infrastructure Report 2022
|4
|772
|15