Analyzing Mobile Device Threats and Implementing Security Measures

Verified

Added on  2023/01/11

|8
|2120
|79
Project
AI Summary
This project report delves into the critical aspects of mobile device security, exploring various threats such as malware and worms, and analyzing how devices become vulnerable to destruction and abuse. The report proposes and justifies two key security protection techniques: setting up remote wipe capabilities and encrypting data on mobile devices. Furthermore, the project investigates how organizations can ensure the availability of web services using Linux servers, specifically focusing on Apache web server configuration. It identifies and explains the use of Linux auditing tools like Nix-Auditor, Lynis, and Tripwire to monitor and analyze web server and email server problems. The report also includes practical exercises, such as creating directories and users within a Linux environment using relevant commands. The project aims to provide a comprehensive understanding of mobile device security and Linux server management, offering practical insights into threat mitigation and system administration.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Applied Project
1
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
INTRODUCTION...........................................................................................................................3
TASK 1............................................................................................................................................3
Describe about two types of threats against mobile devices. Identify that how devices
vulnerable to destruction and abuse.............................................................................................3
Propose and Justify two type of security protection technique for mobile device and how it can
be used to mitigate threats...........................................................................................................4
Describe that organization ensure the availability of web service by using Linux server...........5
Identify Linux auditing tools and understand that how it can be used by MBC firm to monitor
and analyse the web server and email server problems...............................................................5
TASK 2............................................................................................................................................6
Create two directories under main directory, consider both directories of students...................6
Demonstrate that create three users and identifying first name of student by using commands. 6
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8
2
Document Page
INTRODUCTION
The assessment is designed to assess technical skills in investigating the information system
security, risk threat and management within organization. The documentation will describe about
the different type of threat against mobile identify and analyse that how devices vulnerable to
destruction and abuse. It will propose various security protection technique that always support
for providing the mobile device. Furthermore, the report will describe about the availability of
web service with the help of Linux server. However, identifying the various Linux auditing tool
to monitor and analyse the web server. In additional, it also identifying email server related
problems.
TASK 1
Describe about two types of threats against mobile devices. Identify that how devices vulnerable
to destruction and abuse.
As all hardware devices with an internet connection, there are wide range of threat to smart
device by using operating system. In the line with portable devices, various malicious software
industry is growing in both structural as well as technological terms (Alloghani and et.al., 2020).
Viruses and Spyware that can infect mobile devices. There are various type of security threat that
can affect mobile devices.
Malware: It is a type of software aimed at private specific information which directly
disturb users. It may cause breakdown of device. As a result, it causes information, documents
that belonging to user. Malicious software which infected the mobile phone and affects the entire
processing of system (Guarda and et.al., 2020). The malicious software which is not spread
themselves but large amount of size the device management and information. It directly targeting
the sensitive data that will be stored within Mobile phone.
Worms: it is counted among malware contain harmful and misleading instruction. It
directly affecting mobile device but do not require user interaction in proper manner. It is a type
of virus that affecting on the documentation file. The worm Penetrates by using vulnerability and
also integrated into running service within mobile device.
3
Document Page
The devices vulnerable to destruction and abuse because it can be encountered issue or
threat within mobile phone it should be considered in the hardware device. However, inability of
mobile device is assuring the safety of ports. It is primarily used for connecting to network or
internet. In fact, Mobile device have no appropriate navigation due to limit use in internet
environment (Cavallari, Tornieri and De Marco, 2019). In this way, Hacker can easily access to
the mobile data and unsecure port. Vulnerabilities are largely arise from permission given during
installation of particular application.
Furthermore, Mobile device is basically store large amount of digital data that will
vulnerable to misuse, error, fraud and destruction. The internet is designed to open system which
makes internal system more vulnerable to actions from hackers. Furthermore, hacker can easily
Penetrated by other intruder through Sniffer program to obtain an address and access resource of
network.
Propose and Justify two type of security protection technique for mobile device and how it can
be used to mitigate threats.
In MBC firm, it allows the employee to use their own computing devices such as
smartphones, tablet, PC to work with them. In additional, it provide the information system
service to the staff, customers. But in most of cases, it has been increased the vulnerabilities,
threats which directly affecting on the hardware device (Ferrag, Maglaras and Janicke, 2020).
Furthermore, it can be identified the two different type of security protection technique which
directly mitigate with threats.
Set up Remote Wipe Capabilities: This ability enables to remove any type of data from
mobile phone even if they have no longer used physical itself. It is becoming great safety
technique in case if phone is lost and cannot find it (Guarda and et.al., 2020). The process is
setup the remote wipe differ by hardware device. This type of technique used to mitigate with
threat which enable to show alert message for users. .
Encrypt data on mobile device: It is based on the encryption technique that provide the
better facilities to use single key to encrypt and decrypt data. In order to share with authorised
people. A theft is single device that can lead huge data breach (Girei, Shah and Shahid, 2016).
The employee could access sensitive information through mobile phones. Encryption technique
is used to mitigate with threat to send data from one node to another in the form of encrypted
coding.
4
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
As above discussion, it has justified that security protection techniques support for
implementing the encryption strategy that putting collaborative efforts between IT and
management team. In order to prevent or detect the cyber-attacks. It ensure that hacker will not
able to reach data from mobile phone by using security protection technique.
Describe that organization ensure the availability of web service by using Linux server.
Apache is one of most commonly use web server on Linux system. It can be used to sever
the sever web page which required by hardware system. In this way, organization require to
configure Linux apache web server as root (Guarda and et.al., 2020). It will be require to
configure firewall to perform in proper manner. Initially, MBC need to check availability of
webserver and hosted the website by using apache server.
MBC firm will use the Apache web server by using Linux to host the organization website.
It ensure that web service always available by using Linux which making enterprise accessible to
right audience (Guarda and et.al., 2020). When service is interrupted that can directly harm the
overall business profits, function and reputation. In order to monitor webs service availability as
standard practices. MBC firm can easily identify the problem when arise or deploy prevention
action before trouble strikes.
In another way, it can be understand that well managed service is perform as self-
diagnostic vehicle. It always support for monitor faults, problem and addresses them as they arise
(Guarda and et.al., 2020). Furthermore, A managed service provider can do same thing for
enterprise functions whereas MBC firm will monitor web service availability and allows to
concentrate on running the organization.
Identify Linux auditing tools and understand that how it can be used by MBC firm to monitor
and analyse the web server and email server problems.
There are various kind of Linux server auditing tools such as NIX-Auditor, LYNIS. Initially.
Nix-auditor tool is mainly focused on checking the password aging, account and other file
system. Lynis is also another type of auditing tool which always supported by Linux. This type
of tool is useful for online dashboard which help for MBC firm to check sever against the
policies and procedures.
Tripwire is another kind of auditing tool that mainly used by MBC firm to monitor use of
unauthorised documentation files. Various Linus auditing tools that will help for analysing and
5
Document Page
monitoring the problem within organization. Various tool can be used for debugging Linux
system problem in proper manner.
TASK 2
Create two directories under main directory, consider both directories of students.
MkDir is based on the command used in Linux that allows user to create and make own
directories. The command stands for “Make Directory”. User should keep in mind that handled
by LINUS.
Is command used in Linux that can easily listing all directories in particular location.
Cd is providing the navigation from Main directory to sub directory.
Command to use make Main directory and Sub-directory:
$ mkdir StudentID1
$ cd Documents/
$ mkdir SBM4304
$ ls -R (show recursive directory tree)
Command to set up the permission to main directory: it is consider the way of doing the
permission. Initially, it require to grant permission and also creating directory. Furthermore, it is
another way to grand full access after creating suitable directory (Solanky and Bhatti, 2019).
Sudo command is basically used in the Linux to gain permission on any directory on system. it is
primary used to provide facility read, right and execute permission.
$ sudo chmod -R 777 /var/SBM4304
$ mkdir -m777 SBM4304
$ ls -l
Demonstrate that create three users and identifying first name of student by using commands.
It is an essential part to create different user group so that it can easily enhanced the security,
privacy. In another way, it will be creating for different users which always helping to reduce the
access of directors, documentation files (Solanky and Bhatti, 2019). Sometimes, it should be
considered the multiple folder of users in different manner. It is commonly used the significant
command to create suitable username and password such as adduser, useradd, passwers and
adduser. These are important command use in the Linux for creating user within specific
limitation.
Passwd is command provide instruction to set up new password for particular user.
6
Document Page
$ useradd u1
$ passwd u1wword
Afterwards, it will change the password for user U1 which mainly shown. It also enter the new
password and retype password again.
$ useradd u2
$ passwd u2
CONCLUSION
From above discussion, it has summarised about the different types of threat against mobile
phone which identify and analyse that how devices vulnerable to destruction and abuse. In order
to propose the various security protection technique that always support for providing the mobile
device. Furthermore, it can be understand the availability of web service by using Linux server.
However, it also considered the various Linux auditing tool to monitor and analyse the web
server, identifying email server related problems.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Book and Journals
Alloghani, M. and et.al., 2020. A Systematic Review on Security and Privacy Issues in Mobile
Devices and Systems. In Handbook of Computer Networks and Cyber Security (pp. 585-
608). Springer, Cham.
Cavallari, M., Tornieri, F. and De Marco, M., 2019. Innovative security techniques to prevent
attacks on wireless payment on mobile android OS. In Advances in Computer
Communication and Computational Sciences (pp. 421-437). Springer, Singapore.
Ferrag, M.A., Maglaras, L. and Janicke, H., 2020. Authentication schemes for smart mobile
devices: Threat models, countermeasures, and open research issues. Telecommunication
Systems. 73(2). pp.317-348.
Girei, D.A., Shah, M.A. and Shahid, M.B., 2016, September. An enhanced botnet detection
technique for mobile devices using log analysis. In 2016 22nd International Conference
on Automation and Computing (ICAC) (pp. 450-455). IEEE.
Guarda, T. and et.al., 2020. Mobile communication systems: Evolution and security.
In Developments and Advances in Defense and Security (pp. 87-94). Springer, Singapore.
Solanky, M.J. and Bhatti, D., 2019. A Review on several vulnerabilities detection techniques in
Android Mobile.
8
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]