ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Mobile and Wireless Security: Issues, Threats, and Solutions

Verified

Added on  2023/06/03

|10
|615
|231
AI Summary
This presentation discusses the security-related issues and problems of mobile and wireless systems, including DOS and DDOS attacks, data breach, traffic analysis, and more. It also discusses methods and techniques to improve the security of mobile and wireless systems.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Mobile and wireless
security

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
Mobile and wireless technologies are used to
share data or information from one person to
another
Security of mobile device is defined as a
process to protect users data from malicious
and other attacks
The use of mobile and wireless networks is
increased by 40% in between year 2015 and
2017 (Liang, and Yu, 2015).
Document Page
Introduction
The security of human private data is very
crucial point for an organization
The main aim of this presentation is to
highlights the security related issues and
problems of mobile and wireless systems
Due to lack of security consumers can face
the issue of data breach and they can lose
their data.
Document Page
Mobile and wireless security issues
There are following kinds of security issues
and threats occur with mobile computing:
DOS and DDOS attacks
Data breach
Traffic analysis
Spoofing
Push and pull attacks
Captured and retransmitted messages

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
DOS and DDOS attacks
DOS is defined as a denial of service which is
a part of security threat
Hackers use botnet and flooding process to
block the computer networks of users
Generally, attackers produce large amount of
traffic signals and transfer on mobile
networks
Hackers send spam and fraud mails to users
and collects their private details like login ID
and passwords
Document Page
Data Breach
It is a security issue which occurs in the
mobile and wireless devices
It includes personal health information,
private data, and personally identifiable
information
In which hackers first enter into mobile
networks and then control the private details
of individuals like bank details, credit and
debit cards numbers and OTP.
Document Page
Traffic analysis
It is used to control and monitor the
communication system between mobile and
wireless networks.
Hackers identify the IP address and other personal
details by using flooding process
It has capability to reduce the performance of
mobile computing (Wu, et al., 2016).

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Methods and techniques to improve the
security of mobile and wireless
Information technology has developed many
steps and techniques to reduce the security
related issues:
Encryption method
Cryptography
Control access
Memory randomization
Robust technology (Sicari, et al., 2015).
Document Page
Recommendation
It is recommended that the issues of mobile
and wireless systems can be avoided by
encryption and firewall technologies
Users ensure that they use only authentic
websites and application (Zou, et al., 2016).
They should update mobile software on
regular basis and use password based
systems.
Document Page
References
Liang, C. and Yu, F.R., (2015) Wireless network virtualization:
A survey, some research issues and challenges. IEEE
Communications Surveys & Tutorials, 17(1), pp.358-380.
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A.,
(2015) Security, privacy and trust in Internet of Things: The
road ahead. Computer networks, 76(5), pp.146-164.
Zou, Y., Zhu, J., Wang, X. and Hanzo, L., (2016) A survey on
wireless security: Technical challenges, recent advances, and
future trends. Proceedings of the IEEE, 12(2), pp.1-39.
Wu, J., Ota, K., Dong, M. and Li, C., (2016) A Hierarchical
Security Framework for Defending Against Sophisticated
Attacks on Wireless Sensor Networks in Smart Cities. IEEE
Access, 4(4), pp.416-424.
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]