NIT5084: Mobile Security Threats and Legal Implications

Verified

Added on  2025/05/09

|17
|5052
|338
AI Summary
Desklib offers solved assignments and past papers to help students succeed.
Document Page
NIT5084 -Cyber security law, Security law, Regulation and
Policy
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
In the technological era application of new and advanced technologies is very common. The use
of innovative and advanced technologies involves numerous threats and security issues.
Technologies are used in almost every device. The most common threat which is faced by every
person or organisation is mobile security. The rate of crimes from the mobiles is increasing day
by day. Smartphones are very important and play a key role in daily life. The organisation and
people nowadays are facing a lot of security issues with the use of mobiles. The risks associated
with the use of mobile phones are data storage risk, application risk etc.
The personal and business information is stored in the smart phones. The employees share
important and sensitive information via Smartphone. Security attack overall the smart phones
makes the security system weak. Mobile security is essential for the protection of data and
information. With the raise in the trend of accessing commercial resources with personal devices
is rising the vulnerability of records being misused. Through the attack on the mobiles, the data
can be stolen and this information can be used by the competitors for gaining competitive
advantage. Mobiles are used in each and every sector as now the mobile functions are able to
perform every function. In the banking industry through the mobile phones funds are transferred
and the payments are also done through mobile phones. So, there are various risks are associated
with the use of smart phones. For the prevention of mobile security threats, there are numerous
laws has been made. The laws are made with the aim of preventing the attacks and threats
associated with the use of mobile phones. These laws protect the data and strive to reduce the
rate of crimes. The aim of this essay is to cover the risks and threats which people and companies
face on the use of mobile devices. All the rules and regulations related to mobile security will be
covered in the essay.
2
Document Page
The Evolutionary View of Trend
With the use of advanced technology evolution of the smart phones has begun in the year 2000
with blackberry. With the advances, the threat top mobile security is increasing. In the corporate
sector use of BYOD policy that is “Bring Your Own Device” has become very popular and the
employees have started carrying their personal devices at the companies. There are multiple
techniques available by which the data stored in the mobiles can be hacked and can be used for
the personal benefit (Taylor, 2016). The most common method is phishing. This is used to steal
personal and professional information stored in mobile phones. This is the most common form of
attack on the important information.
The major challenge in the use of mobiles is leakage of information or data. The degree of
crimes related to mobile security is rising speedily. Leakage of the confidential information is the
key issue which is associated with mobile devices. Unauthorized users with makes their control
network of these devices weak. In this way, they can easily steal important information related to
companies. The companies usually store all the information in the systems. Stored data can be
misused by the hackers for harming the reputation of the company and to gain the advantage
over the firms.
Past
In the past or last years, the security on the protection of the data and information was less. The
companies were using the traditional methods of securing the data. Mobile security is just not
about the security of the data but also about the security of the applications which are used in the
mobiles.
Many companies over the last years were using the Mobile Device Management (MDM)
technique or tool for providing security to the devices. With the use of this technique, the
companies were able to track the commercial owned devices and these devices can also be
locked in the data lost with the assistance of the MDM tool. The shortcoming of this tool was it
can only protect the actual device (Valli, 2016). This tool was not able to protect the data and
important information.
3
Document Page
The companies due to the shortcoming of the MDM tool switched to Enterprise Mobility
Management (EMM). This tool is most widely used by the organisations to secure the data and
to overcome the shortcomings of the MDM tool. By this tool, a secure area can be created. With
the flow of time, the usage of mobile application and the threats which are related to the mobile
phones extended.
Present
In the present trend, the companies are using EMM for protecting the devices and for protecting
the useful information. In the present situation, the rate of crimes is increasing rapidly. Now the
companies moved to CYOD (choose your own device) from BYOD. The threats in the present
situation are unauthorised access, loss of corporate information or data etc. To prevent the threats
or vulnerabilities the companies should have strong internal control. EMM protect the data when
the employees access corporate devices. In corporate devices, all the information stored. Loss of
data can cause various harms to the companies (Regulation, 2018). To avoid the misuse of the
mobile devices companies measures the application accessed by their employees. Various
industries allow customers to interact with them and use their services with the use of mobile
applications.
In the technological and modern world, the use of mobile applications requires tight security and
strong internal control. Confidential information and data should be protected by the use of
various applications and techniques. Mass360 is software which is developed by IBM and used
by the enterprises to maintain the confidentiality of the records and data. With the use of EMM,
the use of IoT devices the companies maintain the security of mobile and other devices. The
companies are using such software that continuously scans or monitor the activities of the
employees and determine the possible risk associated with the use of applications.
Future
Each and every organisation is in the need of implementing a protected internet of the things in
the future. To reduce the risk the companies are developing strong internal control for the
protection o0f the data and the confidential information of the company that may be misused by
someone else for the personal benefit. Now the government is also making strict laws for
preventing the threats and risks. The objective behind making such laws and regulation is to
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
reduce the rate of crimes. Cyber-crimes are increasing day by day. There is needed to make laws
for preventing crimes. In the banking industry, customers use pins and other confidential
information. Hence the industries need use such application which mitigates the risk of data loss
and unauthorized access.
Security and privacy are the main concern in this technical or digital world. For maintaining the
security, the companies need to secure mobile channels. The mobile applications are customers
oriented. There are no prescribed rules and regulation in relation to how the data or information
will flow. If the mobile devices are used in the unsecured network then the risk of data loss and
increases. In a future lot of technologies and software will be invented for the protection of
mobile devices. Mobile devices are useful in mobile computing. In the future, corporations will
use privacy measures and high technologies to reduce the threat associated with the use of smart
phones.
5
Document Page
The implication of trend to the world that we live in
Security of the data is the major area of concerned to the users of mobile phones. The users of
the mobile can store their data on both on the phone and on the cloud. While storing the data on
local, the user is at the responsibility of securing data but when data is stored on the cloud then
there might be a risk to lose data if any scams or malware gets installed in the phone. Usually,
people store their data, financial credentials and all the personal data on phone. In case of
infringement of security, there might be a chance that the employees may lose the confidential
data of their organization. Phishing campaigns also breaches the security of mobile phones. The
SMS scams which steal the data of the user and such phishing is known as Smishing and
phishing done by voice calls is known as vishing. The sad fact is people are not aware of these
malware and security threats (Azfar, et. al., 2016). Businesses allow its employees for giving
remote services like work from home etc. also provide those several resources which have the
company’s confidential data. There might be high risk involved in losing the corporate data.
According to recent surveys, 96% of apps which are free to use share the data with the third
party. And people without being aware of the fact that their data has been shared with the third
party. 26% of the Australian respondents of the survey are strongly concerned with the security
of their data stored on mobile. 55% of the employers of the Australian organisations are aware of
the fact that they are putting their data at risk by allowing the employees to save data on mobile
phones. Losing the device is not the sole issue but the devices also get infected by the malware
which crashes or steals their data (Mann, et. al., 2018). In order to protect the data from this
malware, it is important that the users imply with the security policies of the organization as this
will not only help them in securing organisation's information but also would secure their
individual data. Besides the installation of unwanted malware, the other vulnerabilities which
affect the security of the mobile are unprotected Wi-Fi and mobile botnets.
It is highly recommended to the Australian organisations to frame the policies regarding the
security is because the formulation of these policies shall help the organization in ensuring the
protection of corporate data. The enhancement in the trend of mobile security shall provide a
secure cyber environment in the organisations. The implication of trend shall also help in
assisting in reaping of digital trust as the identification theft is also a major area of concern. As
6
Document Page
per the survey, 62% of respondents are concerned about identity theft. Another reason for the
implication of the trend is that people do not want to store their data permanently and neither
they want their data to get accessed by any other person. In the corporate world, specifically, the
IT department is stressed about the blitzkrieg of mobile sustenance requirements. The security of
mobile phones is the top most concern for them. Hence, the implication of the trend of mobile
security is on top of the priority list of corporate.
Mobile devices are used by everyone. Employees are not only using mobile devices at the
workplace they are totally dependent on mobile devices. The hackers can hack or gain
unauthorised access within 30 seconds if the network of mobile devices is weak. The mobile
devices are easily portable and small portable. These are very light weighted hence can be
carried everywhere (Kearns, 2016). There are multiple ways that harm the security of mobile
devices. WiFi hotspot is unsecured networks and can be used to get the data or records for
misuse. Network spoofing is another way of gaining access to the applications and other
sensitive records. The fake advertisements are set by the hackers which encourages the users to
create an account. In this way, information and data can be accessed.
An EMM solution is the best way to protect the data and the employees of the organisation. With
the help of this solution, additional security can be provided to the mobile devices of the
employees. When the employees access the data or applications of the company then this
solution can provide security to the devices in order to secure the stored records. This tool
deletes the device when the connection or device is lost. Most of the companies use BYOD
policy and allows the employees to use their devices to perform their jobs. This tool supports the
companies to smoothly adopt BYOD policy and run their activities in a managed manner.
With the help of IoT devices, strong control can be placed over the use of mobile devices. The4
mobile channels should be secure. The mobile application is very useful to deliver high quality
of the services. There must be a set of rules so that the data of customers can be protected.
Mobile devices in the corporate sectors are used for making the functions of the business easier.
The applications installed for various websites are not secure and if someone installs the
application then the security system of the mobile devices becomes weak. The security of the
mobile device is very essential as loss of data may result in huge loss to the company.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
In the banking sector the debit card number, credit card number, and a lot of sensitive
information can be hacked by the cyber criminals. At the time of accessing various website pop
message (Phishing) occurs and the scammers can obtain personal and financial information of
the people. The government sector stores the data related to the defence, plans and the
information related to the national security (Richet, 2016). This data needs to be more secure.
Due to various attacks on the devices the national security can be harmed. In the current
situations, cyber-crime is very common and the corporal information can be obtained easily
using various methods. The digital evolution made it essential to respond to the risk and
securities and the use of mobile devices cannot be avoided. In the current situation identity, data
and availability are the most common areas which are targeted the most.
8
Document Page
Application of the legal and legislative considerations in relation to the trend
Safety of the personal data and the other sensitive information is one of the major challenges that
are observed in the design practice and digital health solutions (Chen, et. al., 2016). In the
current scenario protection of the personal data and safeguarding of privacy is the major issue
with respect to the technology of mobile. For instance, the application of the mobile technology
trend in the working patterns of the organisation can improve the level of productivity by
allowing them access to up-to-date data. However, in the application of such technology, an
organisation may lose its control over its data. The major issue in this regard that can be faced is
that the authority concern will not be able to identify where the data is stored and also the data
stored on mobile devices cannot be backed up. As such the data becomes vulnerable leading to
the loss of the critical data (Roach, et. al., 2016). Another issue that can be faced is with respect
to security. In addition, it can be analyzed that there are a series of major issues with respect to
the mobile technology trend and its security. These factors include device losses, security
application, device data leakage, and other related threats. For such purpose, the main
responsibility is of the IT department so as to ensure that the mobile devices are properly and
effectively protected. This aspect is an essential point to be taken into consideration as it affects
the working patterns of the business organisation in a great manner. As such this, it is determined
that there is a great need on the part of the authority concern to formulate suitable and
appropriate laws and legislation that can assist in the attainment of the effective command and
supervision on the application of the mobile devices (Roach, et. al., 2016).
For such purpose, the Australian Government provides for the various laws and acts that can
assist in the attainment of the proper supervision on such activities of threat (Titonis, et. al.,
2017). Such laws will assist in the prevention of the crime by the persons leading to the better
and smooth conduct of the activities. The various laws formulated in this regard majorly and
predominately include:
The privacy act 1988
Government of Australia enacted this with the main and primary motive of maintaining the level
of privacy of the data of the business organisation. This includes the protection of the relevant
data that assist in the business concern in the conduct of the business activities in a proper and
9
Document Page
effective manner. Further provided, this act tends to provide suitable and effective control on all
the data and information that is confidential to the interest of the company (Titonis, et. al., 2017).
As such, there is a great responsibility on the part of the Australian Government to manage and
secure the data and information leading to a greater level of transparency in the work operations.
In the context of the act, the basic personal information includes all the details of the individual
along with all the past and present records that can be used for future reference.
Data protection act 1998
The data protection act basically deals with the development of effective and suitable control on
how the personal and customer information is accessed by the organisation concern (Roach, et.
al., 2016). The act provides for the various data protection principles that are to be abided by all
the individuals. Some of the principles in this regard include that the data must be used in a fair
and transparent manner, the data must be used in the adequate, relevant and in a manner that is
necessary for the work operations. Further provided, the data is requisite to be handled in a
manner that ensures appropriate security against unauthorized processing, loss, destruction or
damage. This will lead to a better and effective command on all the facts and aspects.
Surveillance devise act 2004
The concerned act was enacted with the main motive to establish suitable procedures for the law
enforcement officers for the installation and use of the surveillance devices in relation to the
criminal investigation with respect to the mobile technology trend. In addition, the application of
such surveillance devices will substantially assist in the protection of the public interest with
respect to the data and information (Titonis, et. al., 2017). As such, the concerned act requires the
agencies associated with the protection of the data must ensure fair conduct of the activities
leading to a greater level of transparency.
Information Privacy Act, 2009
Information privacy act basically deals and concerns with the providing of the suitable and
effective framework for the protection of the personal and confidential information that is being
accessed by the business associations (Chen, et. al., 2016). Further provided, the concerned act
provides for the series of the rules and regulations that are to be abiding by the authority concern
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
in order to collect and assort the personal information of the individuals. Without the approval of
the appropriate authority, the act restricts an individual person to make any sort of the changes in
the personal information so as to maintain a suitable level of transparency.
In addition, it is necessary on the part of the authority concern to evaluate each and every aspect
associated with the law so as to gain all the pros and cons points leading to better and effective
decision making.
As such it is determined that the Australian Government has made enhanced efforts for the
protection of the data and other related information with respect to the trend of the mobile
security (Abawajy, et. al., 2018). However, more amendments must be made by the Government
in this respect so as to have suitable command and supervision leading to a greater level of
transparency.
11
Document Page
Future prediction in relation to mobile security
With the increasing and enhance the application of the mobile security trend in relation to the
technological terms there is a great and serious revolution in the working patterns of the business
organisation (Chen, et. al., 2016). However, with the great and effective application of the
mobile trend in the working patterns, there is a great elaboration on the threatening of the
security system. With the changing patterns of the market environment, such security issues are
increasing leading to the great barriers in the work operations. The major issue in this regard that
is being faced is with respect to the loss of the data and confidential information. Further
provided, it has been analyzed that with the changing patterns of the environment such security
issues will increase leading to inappropriate command on all the facts and aspects related to
working patterns of the concert association.
As such there is a great need on the part of the Government of Australia to focus and take into
consideration the security issues related to the mobile trend so as to build suitable and effective
trust of the customer and the other related parties on the application of the mobile technology in
the work operations (Abawajy, et. al., 2018). For such purpose, it is requisite that the Australian
Government focus on the formulation of more strict laws and legislation in relation to the
security issues so as to have better and effective command on all the information. In addition, it
is predicted that the suitable regulations must be made on the breach of any action so as to attain
the command on the security matters leading to the better conduct of the activities (Roach, et. al.,
2015). This will, in addition, assist in the bringing of suitable innovation and creativity in the
work operations. Apart it will assist in the gaining of the suitable trust of all the customers from a
greater market scenario.
Another prediction in this regard that is evaluated is with the aspect of the application of the
banking applications on mobile technology. The use of banking application on the mobile has
made it easier for the customers to access their transactions in a better and quick manner.
However, the use of such applications on the mobile tends to create series of the risk factors that
tends to affect the perception and views of the customer in a great manner (Chen, et. al., 2016).
As such it can be said that the suitable efforts with respect to such issue must be made by the
12
chevron_up_icon
1 out of 17
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]