logo

Risks and Security Challenges of Wireless Communication and Mobile Technology

Understanding the role of policy in information security and discussing the major types of information security policy and their components.

7 Pages1235 Words112 Views
   

Added on  2023-06-09

About This Document

This article discusses the risks and security challenges associated with wireless communication and mobile technology. It covers the advantages and disadvantages of using these technologies and provides recommendations and suggestions to improve security. The subject code, subject name, semester number, student name, and university name are not mentioned.

Risks and Security Challenges of Wireless Communication and Mobile Technology

Understanding the role of policy in information security and discussing the major types of information security policy and their components.

   Added on 2023-06-09

ShareRelated Documents
Subject code (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
Name of the Student
Name of the University
Author Note
Page | 1
Student id (Please Fill)
Student name (Please Fill)
Risks and Security Challenges of Wireless Communication and Mobile Technology_1
Subject code (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
Table of Contents
Introduction....................................................................................................................3
Discussion......................................................................................................................3
Advantages.....................................................................................................................5
Disadvantages................................................................................................................5
Recommendation and suggestions:................................................................................5
Conclusion......................................................................................................................5
References......................................................................................................................7
Page | 2
Student id (Please Fill)
Student name (Please Fill)
Risks and Security Challenges of Wireless Communication and Mobile Technology_2
Subject code (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
Introduction
The wireless communication and Mobile technology is one of the most common form
of technology that is been used in the regular world. These devices are used for the purpose
of transmission of texts, images and chats. This has become the most useful technology that
have been ever made, but there are also some of the major risks that are associated with it
(Safa et al., 2016). With time people are more getting attached with the technology and the
chances of various risks are increasing with days.
Discussion:
The wireless communication are used in almost every aspect of the modern life
starting from the telecommunication devices to car keys. These systems are integrated in
almost everything and everywhere. But the use of these things are increasing the risks of
everything that are associated with it. The major reason for risks associated with the mobile
technologies are due to the fact that the wireless technology is easily hack able by hackers.
One of the major risks that comes with this the introduction of the Bluetooth watches which
can access every user information. Hackers use the device of the victim for the purpose of
stealing information and use them for the purpose of stealing.
Why?
. In the modern technology one now do not need to use car keys for unlocking a car but it can
be easily done with the wireless and the mobile technology. Other than using the bank and
going for a bank is also an old concept as people can now use thee mobile applications. Thus
creating a risk of data stolen.
Page | 3
Student id (Please Fill)
Student name (Please Fill)
Risks and Security Challenges of Wireless Communication and Mobile Technology_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risks and Vulnerabilities of BYOD Policy in Gigantic Corporation
|12
|4187
|235

Three Most Recent Wireless Technologies
|6
|1669
|1

Three Most Recent Wireless Technologies
|6
|1669
|80

The hackers are continued to target the social media
|3
|731
|14

ITC504 Interface Usability Assignment
|27
|2324
|100

COIT11238 - Networked Infrastructure Foundations
|15
|3502
|93