This article discusses the challenges and solutions for securing mobile devices and network connections. It highlights the risks of using unsecured wireless networks and downloading untrusted mobile applications. The importance of implementing security measures such as VPNs and endpoint security gateways is emphasized.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Mobile devices and network security Name Institution Professor Course Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction Technology has come up with increased need to connect to the internet either for business purpose of social activities. After invention of internet, it was a common understanding that network connection was solely preserved for computers. Interestingly, this norm has changed and devices with capability to connect to the network and subsequently to the internet are increasing substantially. With innovation of network enabled devices such as smartphones and tablets, security concern to both data and the connected devices has turned to be paramount. Since organizations and individual users make use of the network for business purpose, failing to secure both devices and network expose business to operational risks (Gelenbeet al.2013, pp. 8). Though intensive network security considerations might be a challenge to novice network users, there are simple and obvious measures that all mobile users should be able to setup. Some of the mobile security threats that mobile users should check on are; use of unsecured wireless networks, network spoofing, phishing attacks, spyware and data leakage. Mobile network security should be of major concern to the entire technology fraternity due to data confidentiality and increase in number of malware attacks. Mobile device security should focus on full data protection as well as network that is connected to these portable devices. Operational fundamentals and networking principles Internet connection has been adopted as the norm and modern tool in business operations. To connect to the internet, devices should be connected to the network in order to facilitate sharing of the data among entities. Important to note is that once connected to the internet, mobile users do not bother on security of their own or organizational data. By considering the security of the data and any network enabled device connected to the internet, networking principles are of great importance. It is only through network connected to the device that
determines which information can be shared to and from individual device (Yanget al.2015, pp.77). First, unsecured wireless network has become common in public places and even workplaces. As a result, due to increase on need to access various online services, network users do not intent to burn their cellular data while wireless hotspots are available for free. As much as there are norms of free network, unsecured network should not be used to access sensitive and personal data such as banking services and credit cards. Making connection to unsecured wireless network exposes device users to threats such as hacking and malware attacks. Malware and hackers can invade the device without user’s knowledge and retrieve data for other unauthorized uses (Lianget al.2014, pp.36). Since wireless network supports many users at the same time, threats can be posed from both within and outside the network. Next, data leaks has been a major challenge that mobile users face by allowing network connection from their devices. With increase in use of mobile application that operate on network connection, it is clear that most of the applications are spoofing data from these devices. Mobile users should be concerned before allowing applications to have access to any of their personal data stored locally on their devices (Roman, Lopez & Mambo 2018, pp. 686). Despite these apps being free, important to note is that they send data to remote servers. Collected data is stored and controlled by third parties which in turn can be mined by advertisers and cyber criminals. To compact mobile vulnerabilities, secure web gateway are preferred as they offer strong security on wireless network. With ever increasing use of mobile devices in both industrial and personal level, secure getaways can be set up at DNS and IP layers to protect users from malicious attackers. Similarly, end point security and virtual private network (VPN) can also be used to secure portable network enabled devices (Eslahiet al.2014, pp.189). Setting up network configurations help organizations and individuals prevent malicious attacker on mobile users
without their knowledge. Apart from security flows observed from mobile network, necessary security measures can be put in place to make it secure and usable over time. As much as there is a focus on security concerns of both portable devices and network, state governments should provide sufficient rules to govern network and mobile security. State governments should focus on what deems more on personal data and unauthorized access and provide strict regulations as well as penalties. Rules and regulations would help international community to protect users from both internal and external attacks. Leaving portable devices uncontrolled would expose user to uncontrolled attacks which can be mitigated through legislations by state governments and international communities. In order to come up with effective rules and regulations, technology related professional bodies and all stakeholders can learn from previous events (Goyal, Pandey & Batra 2012, pp. 2). Through use of previous information system attacks, rules canbeformulatedtooutlineclearlyboundariesbetweenpersonaldata,privacyand confidentiality. Weaknesses and potential applications Protection of data by individuals and organizations has been a great challenge due to nature of network access and knowledge required to keep personal data free from intrusion (Becheret al.2011, pp. 108). Mobile access to some of the sensitive data from within or outside organizationscausespotentialthreattodata access.Informationaccessfromoutside the organization through use of unsecure wireless has been considered as one of the major flaws used by hackers. While on public wireless hotspots, mobile users tend to forget about security of the data they are accessing. Hackers have made a norm to use public network to trap sensitive information from novice technology users. Hackers penetrate to other mobile network users devices without their knowledge, retrieve data such as passwords and use them to commit
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
cybercrime. In this regard, it would be possible to highlight lack of skills on mobile security being one of the major weakness on securing mobile devices while on network. Considering network users are quite naive, there is need for state government to regulate all public wireless installation in order to minimize chances of external attacks (Arabo & Pranggono 2013, pp. 529). On the same note, public should take the responsibility of creating awareness on use of public network for sensitive activities such as banking. In cases sensitive data should be accessed away from subject institution network, public and system users should be advised to create virtual private networks (VPN). Such network are considered more secure and easier to manage. Additionally, mobile devices are considered more vulnerable because most of them are networkenabledbutdo nothavenetworkconfigurationcapability(Ghosekar,Katkar& Ghorpade 2010, pp. 156). Unlike to personal computers, they have capability of having installed firewallsinadditiontonetworksignalfilteringfirewalls.Toprotectbothpersonaland organizational data, mobile devices should conform to all network connection standards before accessing any network. This has been a major weakness which has been exposing mobile devices to security threats. Similarly, use of mobile applications are on rise and almost all mobile users do not understand security measures put in place by users. Once these applications collect data, they are stored by third parties without considering privacy of subject application users. It has been very difficult to ascertain if servers that host data are secure and conform to required international standards on privacy (Raw, Kumar & Singh 2013, pp. 95). Application users exposes themselves to potential attacks without their knowledge because they install applications for personal use. Such applications play a key role in today’s life and users cannot avoid using them. In this regard, state governments and international community should join efforts in order to facilitate secure data storage. International community can establish its own data center where
application owners would be expected to host such applications. This would help international community to secure personal data collected by these applications.The final weakness on mobile security consideration has been on spyware which has been linked to unwarranted download and installation of applications from unsecured websites (Prasad, Gyani & Murti 2012, pp. 10). Research hasproved that mobile device infections have been increasing with high rate over the past 3 years. Conclusion Mobile network enabled devices are increasingly being adopted in the technological world due to their ease of use and availability. Important to note is that network enabled mobile device penetration in the market has come with its share of network security challenges. Most of the mobile users are not aware of security threats that are associated with use of mobile technology. Some of the security threats are caused by use of unsecured wireless network which many mobile user use when accessing personal and organizational data. Similarly, use of untrusted sites to download mobile applications has been another source of threat to mobile users. Due to their demand in the mobile industry, mobile applications have been misused and they have turned to be a big threat in the technological world. It has been discovered that data collected by mobile applications are not stored securely as they can be mined by different unauthorized persons for various uses such as advertisements. To minimize network insecurity from mobile devices, all stakeholders should make sure measures are put in place. State governments and international bodies should help in formulating rules and regulations to protect novice technology users from network threats. Finally, individual users should take initiative of using secure network such as VPN and end point security getaways when accessing sensitive information.
Bibliography Arabo, A. and Pranggono, B., 2013. Mobile malware and smart device security: Trends, challengesandsolutions.In201319thinternationalconferenceoncontrolsystemsand computer science (pp. 526-531). Becher, M., Freiling, F.C., Hoffmann, J., Holz, T., Uellenbeck, S. and Wolf, C., 2011. Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices.In 2011 IEEE symposium on security and privacy (pp. 96-111). Eslahi, M., Naseri, M.V., Hashim, H., Tahir, N.M. and Saad, E.H.M., 2014.BYOD:Current state and security challenges.In 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) (pp. 189-192). Gelenbe, E., Gorbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M. and Lyberopoulos, G., 2013. Security for smart mobile networks: The NEMESYS approach.In2013 International Conference on Privacy and Security in Mobile Systems (PRISMS)(pp. 1-8). Ghosekar, P., Katkar, G. and Ghorpade, P., 2010.Mobile ad hoc networking: imperatives and challenges. IJCA Special issue on MANETs, 3, pp.153-158. Goyal, V., Pandey, U.S. and Batra, S., 2012. Mobile banking in India: Practices, challenges and securityissues.InternationalJournalofAdvancedTrendsinComputerScienceand Engineering, 1(2). Liang, X., Zhang, K., Shen, X. and Lin, X., 2014. Security and privacy in mobile social networks: challenges and solutions. IEEE Wireless Communications, 21(1), pp.33-41. Prasad, M.R., Gyani, J. and Murti, P.R.K., 2012. Mobile cloud computing: Implications and challenges.Journal of Information Engineering and Applications, 2(7), pp.7-15. Raw, R.S., Kumar, M. and Singh, N., 2013. Security challenges, issues and their solutions for VANET.International journal of network security & its applications, 5(5), p.95. Roman, R., Lopez, J. and Mambo, M., 2018. Mobile edge computing. A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, pp.680-698. Yang, K., Zhang, K., Ren, J. and Shen, X., 2015. Security and privacy in mobile crowdsourcing networks: challenges and opportunities.IEEE communications magazine, 53(8), pp.75-81.