ITC596 - IT Risk Management: Wireless and Mobile Communication Report
VerifiedAdded on 2023/06/09
|7
|1235
|112
Report
AI Summary
This report, submitted as part of the ITC596 IT Risk Management course, delves into the multifaceted landscape of wireless and mobile communication security. It begins with an introduction to the prevalence and utility of these technologies, emphasizing their role in modern life while highlighting the associated risks, such as hacking and data breaches. The discussion section examines the 'why, what, where, who, and when' of security threats, particularly focusing on vulnerabilities like those found in Bluetooth devices and mobile applications. The report outlines advantages such as convenience and accessibility while acknowledging disadvantages, including data theft. It concludes with recommendations for enhancing security, like using secure networks and avoiding sharing sensitive information, and emphasizes the importance of user awareness and proactive security measures in safeguarding against cyber threats. References are provided using APA style.

Subject code (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
Name of the Student
Name of the University
Author Note
Page | 1
Student id (Please Fill)
Student name (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
Name of the Student
Name of the University
Author Note
Page | 1
Student id (Please Fill)
Student name (Please Fill)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Subject code (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
Table of Contents
Introduction....................................................................................................................3
Discussion......................................................................................................................3
Advantages.....................................................................................................................5
Disadvantages................................................................................................................5
Recommendation and suggestions:................................................................................5
Conclusion......................................................................................................................5
References......................................................................................................................7
Page | 2
Student id (Please Fill)
Student name (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
Table of Contents
Introduction....................................................................................................................3
Discussion......................................................................................................................3
Advantages.....................................................................................................................5
Disadvantages................................................................................................................5
Recommendation and suggestions:................................................................................5
Conclusion......................................................................................................................5
References......................................................................................................................7
Page | 2
Student id (Please Fill)
Student name (Please Fill)

Subject code (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
Introduction
The wireless communication and Mobile technology is one of the most common form
of technology that is been used in the regular world. These devices are used for the purpose
of transmission of texts, images and chats. This has become the most useful technology that
have been ever made, but there are also some of the major risks that are associated with it
(Safa et al., 2016). With time people are more getting attached with the technology and the
chances of various risks are increasing with days.
Discussion:
The wireless communication are used in almost every aspect of the modern life
starting from the telecommunication devices to car keys. These systems are integrated in
almost everything and everywhere. But the use of these things are increasing the risks of
everything that are associated with it. The major reason for risks associated with the mobile
technologies are due to the fact that the wireless technology is easily hack able by hackers.
One of the major risks that comes with this the introduction of the Bluetooth watches which
can access every user information. Hackers use the device of the victim for the purpose of
stealing information and use them for the purpose of stealing.
Why?
. In the modern technology one now do not need to use car keys for unlocking a car but it can
be easily done with the wireless and the mobile technology. Other than using the bank and
going for a bank is also an old concept as people can now use thee mobile applications. Thus
creating a risk of data stolen.
Page | 3
Student id (Please Fill)
Student name (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
Introduction
The wireless communication and Mobile technology is one of the most common form
of technology that is been used in the regular world. These devices are used for the purpose
of transmission of texts, images and chats. This has become the most useful technology that
have been ever made, but there are also some of the major risks that are associated with it
(Safa et al., 2016). With time people are more getting attached with the technology and the
chances of various risks are increasing with days.
Discussion:
The wireless communication are used in almost every aspect of the modern life
starting from the telecommunication devices to car keys. These systems are integrated in
almost everything and everywhere. But the use of these things are increasing the risks of
everything that are associated with it. The major reason for risks associated with the mobile
technologies are due to the fact that the wireless technology is easily hack able by hackers.
One of the major risks that comes with this the introduction of the Bluetooth watches which
can access every user information. Hackers use the device of the victim for the purpose of
stealing information and use them for the purpose of stealing.
Why?
. In the modern technology one now do not need to use car keys for unlocking a car but it can
be easily done with the wireless and the mobile technology. Other than using the bank and
going for a bank is also an old concept as people can now use thee mobile applications. Thus
creating a risk of data stolen.
Page | 3
Student id (Please Fill)
Student name (Please Fill)
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Subject code (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
What?
These things are done because of extorting money from the users or steal data form
the user or so. It cannot be specifically said why these things are done by the hackers but
there is always some or the other reasons. Cell phone security installation is one of the most
important thing that has to be done by users in order to make the security. Some of the key
concept through which information security can be obtained as through the process of
authentication, authorisation, and accountability.
Where?
Protecting privacy is one of the major aspect of information system. Identification of
information and how it can be vulnerable is also one of the major step that has to be properly
done. Thus one has to make sure that there is proper follow up in the case of the systems.
Who?
Some of the major types of the security challenges that are been faced by many of the
users are: Physical security: Physical security depends on the ICT infrastructure and
workplace various threats. Operational security: Operational security depends on the factor
that operations and works must be done in a proper way without any physical interaction.
When?
The need of the security is needed when there are these two following cases.
Communicational security: Protections of the communications media and proper
contact.
Network security: Network security is one of the most important thing that is to be
done (Peltier, 2016). There can be many forms of network attack that can hamper the regular
Page | 4
Student id (Please Fill)
Student name (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
What?
These things are done because of extorting money from the users or steal data form
the user or so. It cannot be specifically said why these things are done by the hackers but
there is always some or the other reasons. Cell phone security installation is one of the most
important thing that has to be done by users in order to make the security. Some of the key
concept through which information security can be obtained as through the process of
authentication, authorisation, and accountability.
Where?
Protecting privacy is one of the major aspect of information system. Identification of
information and how it can be vulnerable is also one of the major step that has to be properly
done. Thus one has to make sure that there is proper follow up in the case of the systems.
Who?
Some of the major types of the security challenges that are been faced by many of the
users are: Physical security: Physical security depends on the ICT infrastructure and
workplace various threats. Operational security: Operational security depends on the factor
that operations and works must be done in a proper way without any physical interaction.
When?
The need of the security is needed when there are these two following cases.
Communicational security: Protections of the communications media and proper
contact.
Network security: Network security is one of the most important thing that is to be
done (Peltier, 2016). There can be many forms of network attack that can hamper the regular
Page | 4
Student id (Please Fill)
Student name (Please Fill)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Subject code (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
work of a network. There can be various types of network attacks that can help the attackers
use the information of the user. In this case of the major problem is that smart watches are
always connected with the mobile phones and other gadgets of the world. Thus this makes it
easier for the hackers to access any information from anywhere.
Advantages:
Some of the major advantages of the system, is that there can always be chances
where it can be seen that without using mobile phone for the purpose of checking messages
and other information of the phone the smart watch can be used. Hence it can be said that the
small and the compact nature of the device. Thus it is one of the most useful device in the
world in the field of the wireless technology and mobile devices.
Disadvantages:
With the increase use of these technology there increases the chances of getting
hacker by the hackers and the foul players who use the information of the owner for the
purpose of stealing information from the owner of the device. The user must be very much
careful while using this devices and must never share information with other persons.
Recommendation and suggestions:
In order to improve the security of the devices one needs to properly ensure that the
wireless devices are secured. The user must not connect the device to any unknown network
as there can be chances of security breaches. Connecting to unknown networks can lead to
security breaches. Also the user must also ensure that there must not be any banking or other
essential details must not be attached with smart watches.
Conclusion:
Page | 5
Student id (Please Fill)
Student name (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
work of a network. There can be various types of network attacks that can help the attackers
use the information of the user. In this case of the major problem is that smart watches are
always connected with the mobile phones and other gadgets of the world. Thus this makes it
easier for the hackers to access any information from anywhere.
Advantages:
Some of the major advantages of the system, is that there can always be chances
where it can be seen that without using mobile phone for the purpose of checking messages
and other information of the phone the smart watch can be used. Hence it can be said that the
small and the compact nature of the device. Thus it is one of the most useful device in the
world in the field of the wireless technology and mobile devices.
Disadvantages:
With the increase use of these technology there increases the chances of getting
hacker by the hackers and the foul players who use the information of the owner for the
purpose of stealing information from the owner of the device. The user must be very much
careful while using this devices and must never share information with other persons.
Recommendation and suggestions:
In order to improve the security of the devices one needs to properly ensure that the
wireless devices are secured. The user must not connect the device to any unknown network
as there can be chances of security breaches. Connecting to unknown networks can lead to
security breaches. Also the user must also ensure that there must not be any banking or other
essential details must not be attached with smart watches.
Conclusion:
Page | 5
Student id (Please Fill)
Student name (Please Fill)

Subject code (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
Thus concluding the topic it can be said that the use of the wireless and the mobile
technology is a must do thing in today’s world. The user must take precautions in order to
protect the wireless devices from cyber criminals.
Page | 6
Student id (Please Fill)
Student name (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
Thus concluding the topic it can be said that the use of the wireless and the mobile
technology is a must do thing in today’s world. The user must take precautions in order to
protect the wireless devices from cyber criminals.
Page | 6
Student id (Please Fill)
Student name (Please Fill)
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Subject code (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
References:
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards:
guidelines for effective information security management. Auerbach
Publications.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy
compliance model in organizations. Computers & Security, 56, 70-82.
Page | 7
Student id (Please Fill)
Student name (Please Fill)
Subject name (Please Fill)
Semester number (Please Fill)
References:
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards:
guidelines for effective information security management. Auerbach
Publications.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy
compliance model in organizations. Computers & Security, 56, 70-82.
Page | 7
Student id (Please Fill)
Student name (Please Fill)
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.