logo

Mobile Device Insecurities and Vulnerabilities

   

Added on  2021-04-21

9 Pages1641 Words120 Views
Running head: MOBILE DEVICE INSECURITIES AND VULNERABILITIESMobile Device Insecurities and vulnerabilitiesName of the StudentName of the UniversityAuthor’s Note
Mobile Device Insecurities and Vulnerabilities_1
2MOBILE DEVICE INSECURITIES AND VULNERABILITIES SummaryThis paper will discuss the insecurities and vulnerabilities involved in the mobile devices.Different benefits of the mobile devices will be discussed in the research. The current trend andstatistics about the use of mobile devices and cyber-attacks will be provided in the study. Theaim of the research is to identify various insecurities and vulnerabilities in the mobile devices.The objectives and research questions will be discussed in the study. Benefits and limitations ofthe mobile device technology will be provided in the research. The main problem of thediscussed in the paper is insecurities and vulnerabilities of the mobile devices. Security risks andthreats involved in the mobile devices have been identified in the research paper that might helpin mitigating the risks in the mobile devices. However, there are two types of mobile data lossincluding physical loss and misuse of mobile applications. Mobile devices have been used almostby every individual on this planet. The use of mobile devices has been increased on a daily basis. There have been manyevolutions in the technology of the mobile phones. In the last two decades, significanttechnology has been integrated into mobile phones in the market. The demand for mobile phoneshas become exponential in the global market (Barcena & Wueest, 2015). These advances in thetechnologies have extended the virtual limits of organizations. The literature review will focus onthe existing knowledge related to the mobile device risks and vulnerabilities. This research willfollow the qualitative methodology and data collection method. Data will be collected fromsecondary sources including online journals, reports, books and government databases. Thematicanalysis will be conducted to analyze the secondary data. The expected outcomes might fulfil theresearch objectives and questions initiated in the study.Keywords: Mobile Security, Virtual Private Network (VPN) and Encryption
Mobile Device Insecurities and Vulnerabilities_2
3MOBILE DEVICE INSECURITIES AND VULNERABILITIES Structure of the StudyMobile securities have been the essential topic for research in present days. Variousstudies have been done on the insecurities and vulnerabilities of the mobile devices. Majorvulnerabilities in the mobile devices include encrypting of data and information stored in themobile device. Wireless technology used in the mobile device for transmission of data andsignals have been creating major vulnerabilities to the mobile device. The paper will be structured in five different chapters including Introduction, LiteratureReview, Research Methodology, Data Findings and Analysis and Conclusion andRecommendations. Chapter 1: This chapter discusses about the basic information about the insecurities andvulnerabilities in the mobile devices. This chapter will discusses about various informationrelated ti the mobile devices vulnerabilities. Therefore, the aims and objectives of the researchwill be initiated in this chapter. The use of different knowledge about the mobile deviceinsecurities will be discussed in this chapter. This chapter introduces the mobile devicesinsecurities and vulnerabilities in the market. This paper will focus on the cyber-attacks andother threats to mobile devices. This research will explain the impact of the threats and risks onthe business organizations and mobile users in the market. There will be proper strategiesrecommended for mitigating these challenges in the context.
Mobile Device Insecurities and Vulnerabilities_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Awareness Level Of Smartphone Users | Case Study
|13
|854
|176

Security Risks and Prevention Capabilities in Mobile Application Development
|8
|2949
|348

An investigation into the security of mobile phone communication Assignment 2022
|13
|874
|14

Mobile Applications Security
|9
|2657
|64

Mobile Phone Security: Enhancing Device Security Measures
|17
|3756
|495

(PDF) Advanced programming language design
|14
|4570
|66