logo

Data Security in Mobile Computing

   

Added on  2023-01-06

14 Pages2741 Words29 Views
Research Methods
AE_1
Data Security in Mobile Computing_1
Abstract
This present study shows effectiveness and reasons of data security in mobile computing and
how people can protect them against theft or loss of sensitive data. Data encryption will be
shown in this study as the best and effective way of data security and mobile security in mobile
computing. It will also discuss some main problems which businessmen and users face related to
mobile computing like, integrity, confidentiality and authentication which all can create
problems of loss of data. Lastly, it will show effectiveness of businesses as how by making use
of appropriate mobile computing tools they can make their customers feel safe, secure and
motivated.
Data Security in Mobile Computing_2
Table of Contents
Abstract............................................................................................................................................2
TITLE: Data security in mobile computing.....................................................................................1
INTRODUCTION...........................................................................................................................1
Background of the study.........................................................................................................1
Aims and Objectives...............................................................................................................1
Research questions.................................................................................................................2
Systematic Approach (Literature review)........................................................................................2
Reasons and benefits of securing mobile or data in mobile computing.................................2
Some data security issues in mobile computing.....................................................................2
Ways of securing or protecting mobile from theft of data.....................................................3
Research methodology.....................................................................................................................3
Data analysis and Results.................................................................................................................5
Conclusion.......................................................................................................................................7
REFERENCES................................................................................................................................9
Data Security in Mobile Computing_3
TITLE: Data security in mobile computing
INTRODUCTION
Mobile security is all about protection of smart phones, laptops and other portable computing
devices from networks they connect to, threats of data privacy and others (Decharms, 2017).
Mobile security or data security on mobile computing is becoming more important because
millions of people have access to smart phones and they store their personal as well as
professional information’s in mobile phones. So, for protecting against theft of data, wrong
allegations, money security, people require protecting their mobile computing. Mobile
computing allows mobile communication, mobile software and hardware as well. It is considered
as an effective idea that users can process information and also can perform several digital tasks
on mobile devices. Maintaining data and protect themselves against loss or theft of data in
mobile computing is difficult and main task but by using some ways like data encryption in a
timely manner, using computing guidelines, all these problems can be mitigated.
Background of the study
Mobile computing refers a human computer interaction in which people expect from
computer to be transported at the time of normal usage. This present study is going to show
importance of data security in mobile computing as how it can allow people to make use of their
personal as well as professional information without getting affected and accomplish goals. It
will also show some problems and challenges in mobile computing as identification of theft is
quite difficult to eradicate (Todeschini, Hussey and Crimm, 2016). There are several other
problems related to mobile computing which this study will discuss such as: communication,
mobility and portability. It will also show some effective ways by which people can protect
themselves against theft of personal and profession data in mobile computing such as encryption
of data, education or awareness, micro segmentation and making use of cloud government
policies.
Aims and Objectives
Aim
“To define effectiveness of data security in mobile computing”.
1
Data Security in Mobile Computing_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybersecurity and Linux Web Server
|8
|1965
|82

Security and Privacy Issues in IoT Application
|17
|5684
|34

Mobile Phone Security: Enhancing Device Security Measures
|17
|3756
|495

Risk Assessment: BYOD Policy
|14
|4528
|331

Computer Systems Security: A Review
|24
|6181
|477

(PDF) Advanced programming language design
|14
|4570
|66