Cybersecurity Law, Security, Regulation, and Policy in Mobile Devices

Verified

Added on  2025/05/09

|18
|4687
|158
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
N I T 5 0 8 4 - C Y B E R S E C U R I T Y L A W , S E C U R I T Y L A W , R E G U L A T I O N
A N D P O L I C Y
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Introduction......................................................................................................................................3
Evolution of Mobile Security Trend................................................................................................4
Implication of mobile security at global context.............................................................................5
Legislative and legal consideration.................................................................................................8
Future trend in the context of mobile security...............................................................................11
Conclusion.....................................................................................................................................12
References......................................................................................................................................13
Document Page
Introduction
With increase and expansion in technology, mobile security is one of the emerging concepts that
deal with users of mobile phones at a global level and assist in brings out the importance of
mobile security. In all over the world, the estimation of mobile services all around the world is
5.8 billion. With increasing in technology, mobile security is one of the major factors that need
to be considered for maintaining the security level. With the increase in the mobile phone users
and businesses, new risk emerges that directly impact the privacy and confidential data that are
stored in the mobile phones. Mobile security is important to protect portable devices such as
smart phones, smart watches, laptops and tablets. Now people used mobile devices which
contain sensitive and protective data like details of credit cards, numbers of social security and
imperative information related to banking. To protect the mobile from increasing risk from
hackers and other predators present at the online platform. In this context, it is important to take
appropriate steps to take counter measures to secure mobile phones from threats. In this report,
there is a brief discussion on the evolution of the trend in relation to mobile security and its
implications in all over the world. Further, it explains legal and legislative considerations that
need to be abiding by the users and the businesses while using mobile phones. In the end, it
depicts the future trend in relation to the security of mobile phones.
Document Page
Evolution of Mobile Security Trend
In the current world, the increased competition and the market analysis has lead to
the set an alert which helps in securing the business enterprise and help them to
achieve the objective of maximising the security-related issues with the company.
This is seen that the Australian securities and industry association is considered as
the largest body of the individuals which lead to an increase in the performance of
the securities in the company as a whole. This is seen that the association has
made some of the rules that relate to providing the security to the organisation and
also helps in having the security which is related to the electronic market.
With the cybersecurity trends in the country, there isa various rise in the security
issues that related to the performance of the electronic security and mobile security
in the country. This is seen that the corporations in the country are concerned about
the mobile security that relates to protecting the mobile users and securing them
from the attackers, malware and hacking. Hence for this purpose with the increase
in the innovative demand of the customers various technological and the mobile
communication advancements have been made so as to help the customers to
achieve the organisational advancements. It is seen that with the increase in the
information security and increase in mobile security users can achieve the objective
of securing the digital data that is secured in the mobile data. This advancement
helps the users to prevent the entry of the malicious software in the mobile phones
which helps them to add new concept in the cybersecurity and mobile security in
the new age of the digital and the information system.
Challenges that are faced by the organisation within the organisation so
as to achieve the operations more efficiently
This is seen that various corporations in Australia has secured and implemented
various ways through which they can secure the mobile data from being used by
another malicious user. It is seen that the mobile security trend is nowadays
increasing which helps the corporations that are working with them to achieve the
objective of maximising the cybersecurity in the country. It is seen that operations
in the company are considered not to be easy as this is considered to be a major
challenge for the corporations. This is seen that the first challenge that affects the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
operations includes the detection of the occurrences which relates to the security of
the company. This is seen that under this the corporation has to be cautious about
the malicious that affects the mobile user as this stoles the data that is present in
the mobiles. This is also seen that the mobile users roots their phone due to which
they are not able to get the security update and they voluntarily provide the
acceptance for breaching the security contract through which they mobile become
more prone to the threats. This is also seen that the company does not find various
techniques which lead to the advancement of the technologies through which
solution can be made for the security issues in the company. Hence this is seen that
the corporation in the country modify the securities and modes the tools on a timely
basis so that they are able to achieve the organisational goals more specifically.
An evolutionary view of the trend
In the present time, this is seen that there are various practices that are performed
by the organisation to secure the mobile platform under which they are working. It
is seen that the company are using the BYOD policy that helps the company to
secure mobile devices in the country. The BYOD means bring your own device
which is a practice where the consumers bring their own devices so as to protect
them from losing the data. This is seen that there are various ways in the world
which relates to the hacking of the mobile device and also makes them achieve the
data that is stored in the mobile. The information that is taken from this includes
the user names and passwords and sensitive information. While another challenge
that is there in the mobile security platform includes the threat of leakage of the
data. It is done when the users of the organisation provide the unauthorised
permission to the servers so as to achieve unethical data. It is seen that the servers
that are given the permission to access the personal information from the mobile
devices. This is also seen that there is another threat that is related to mobile
security which includes the insecurity to the use of the WIFI networks. This is seen
that through the use of the WIFI which is unauthorised the threat includes the use of
the bluffing of the path that the mobile users want to enter, the fake access point is
made where the user is made to sign up through which the user personal details are
captured.
Document Page
So, there are many employees who utilized the mobile devices in business for
maintaining the functionalities of business and for their Protection Corporation
needs to adopt a protective system in the business.
Past
At the starting stage of the corporation there were numerous types of protective
methods who provided security and which were also according to requirement. But
with the changing of time and advancement of everything makes traditional
methods useless for the corporation because they are not sufficient to meet with
present requirements. Therefore, business applied many new and advanced
methods and technologies of protection in business, for rendering high-quality
protection to the corporation.
The mobile device is used by people on a daily basis and it has become a very
crucial matter of protection, the safety of data in it because the use of mobile is
enhancing day by day. If we see the history of mobile protection tendency then it
can be said that approx ten to fourteen years back the main focus was only on
protection of communication system that applied on global level that generally
called as gsm communication and networks. But with the advancement in mobile
and increment in its users then it is necessary to provide them with more protection
of data and privacy. It enhanced for protection of the third party and reduce the risk
coupled with data of the user.
There are many corporations that adopted the system of management of mobile
devices (MDM) and the main objective to adopt it only provide protection and
security to mobile devices. The ultimate conduct of this system is to provide
sufficient aid to mobile users and assist the functions of the corporation with its use
and adoption.
Present
There has been continuous advancement in technologies and devices, the MDM
process has not proved effective for present time this process is converted into the
management of enterprise mobility (emm). it is a mix of processes, functions and
people who are adopting mobile devices and many other services related to
Document Page
computer that is performed in business and corporation. It is a system that halted
the people to analysing the unauthorised data of business and corporation that
protected in mobile devices. It avails the software that assists the people to delete
the data from a lost device and these software named as wipe technology and
encryption.
In the present time there are much businesses who adopt these mobile devices and
they also have to protect, secure the confidential data and information of business
it requires to applied more strict protection. There are much businesses that are
using mobile devices and they have to apply more strict security system. Ultimately
the management is adopted recently in Australian corporations for protection of
mobile devices, laptops and tablets, other electronic devices. In Australian
corporations, there are mass 350 software that are used for protecting and securing
the data of the organisation and this evolved by IBM system that is more flexible
and easy for corporations.
This system provides protection to data and information that is having in mobile
phones of employees and provide for access data of corporation with information
related to outside activities. It provides advanced protection and security to human
resources incorporation.
Future
There has been an examination done by Forrester consulting about the system of
IBM and conferred that the many corporations are required for a more protecting
internet of things and it’s the adoption in their corporations in near future time. It
refers that only management of data of organisation is not enough but there is a
requirement of protection from outside sources and contravention in the privacy of
data.
Moreover, it is a computerized process in Australian that needs some strict actions
to be taken of protection and safeguarding the data because it affects the whole
economy and all business areas. The organisations need to make better its security
system from the earliest stage of it. If adopted more flexible and resilient methods
for securing data then the possibility of violation of private data can be less.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
In further time the organisations applied and used many actionable, practical
methods that provide complete protection to functions within the corporation. The
Australian lawmakers are expected to make the most rigid laws and rules and
enhance the strict actions for who violates these rules.
Document Page
The implication of mobile security at global context
With increasing in the number of mobile users each and every year, the concern in relation to the
security of mobile phones become more critical than before. Mobile security provides safety of
portable devices such as computers, laptops, smartwatches, smartphones and tablets. Mobile
security is also concern with the private information in relation to the credit and debit card details
including bank details and other imperative information (Mann, et. al., 2018).As per the recent
study, data shows that the number of users increasing every year and in the year 2017, the
number of mobile users increases approximately 800 million all over the world. The importance
of mobile phones and information and communication technology assist the businesses as well as
individuals to live a comfortable life. Huge networks of mobile communication assist in made
possible with the combination of the various different technologies which includes a mobile
communication system, internet, computer networking protocols and distributed computing.
With increasing the use of this converging technologies, greater will be the risk of attacking on
the security of the subscribers of the mobile phones by using the apps of the third party for
downloading purpose (Covington &Carskadden, 2013). Along with the development and growth,
these wireless technologies make the life of human beings easier.Although, the world of
digitalisation and mobile phone technology transforms our whole world. On the other hand, with
increase in mobile technologies provides an opportunity to the criminal for committing a crime.
Intoday's world, the implication of mobile security plays an essential role to maximise the
protection of mobile devices and to its users. Increasing in the use of mobile phones in the
Australian corporate require a more secure system that assists in providing protection of the flow
of information that is communicate among the various level of the corporate and its department.
Due to this, it is imperative to secure mobile phones from the threats of external or internal
nature. According to Stallings,et. al. (2012), there are several threats that affect the working of
the smartphones which automatically increase the requirements for using such practices and
devices that protects the mobile phones from such threats. There are several threat that not only
hampers the privacy of the businesses or its users but also impact the working of the government.
Attackers attack over the three main grounds which includes identity, data and availability. Data
includes the includes the private and restricted information that are stored in the electronic
Document Page
devices for instance details of bank, credit card, debit card and other important information.
Secondly, it is easy for the hackers to customise the characteristics of the mobile phones by using
the, malicious tools and technologies that invade the privacy of the users stored in devices. In the
corporations, it is important that the companies are aware of recent technologies that are
developed to minimise threats to assure mobile security (Shahriar, et. al., 2015).According to
author Liu, et. al. (2012), it becomes difficult for the information technology departments to
determine who access the data and network. Due to this, there are several techniques are used to
minimise such unauthorised access are anti-malware, IPS and firewalls. Another issue in relation
to mobile security is that breaches of mobile security by leaking its passwords. This acts mostly
happen due to the weak passwords There are various threats that affect the working of mobile
phones and other electronic devices like malicious software, juice jacking, cracking of passwords
and electromagnetic waveforms. The major indication of the mobile security is to provide
protection and safety against the malpractices of hackers that hamper the working of the
businesses as well as individuals (Cavoukian, 2012). Mobile security develops by indulging the
technological advancement technologies and tools with the use of modern sensors and expert
devices that support in reducing mobile threats. The implication of the mobile security that
provides maximum benefits to its users so as to give surety to keep the secret and confidential
information secure and safe.
Mobile security is not only important for the users but also at the workplace where there is a
greater possibility of leaking the confidential information of the businesses to the competitors
that affect the overall profitability and growth of the business. It is important that engineering
more focused over mobile malware threats. There are several applications that are enacted by the
hackers which are specially designed to control the devices and access data that are stored in the
mobile phones. Theses apps are specially designed to control the devices for accessing the
private information of the user. According to the author Skovoroda & Gamayunov, (2015),
hackers are also exploiting the weaknesses of the mobile phones white transmission of the data
for instance companies using the WiFi for transmitting information among the workers and give
the opportunity to the hackers to access over the entire database of the corporate. Mobile devices
are also important for the insiders and other employees in the business organisations. Humans
are the weakest source for any security strategy as there are several employees who are not aware
of the installation or operation of the security software. By downloading the unknown
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
applications is one of the major threat over the corporate network. With the use of the mobile
applications, unauthorised use of the personal cloud services can lead towards leakage of data of
the corporate and large amount of transmitting and downloading of data takes place by external
accounts.
For the implication of the mobile security, it is vital that the corporate and users are making sure
about the implications of the defaulted practices of the mobile security and converted them into
the best practices which are useful to minimise the threat in relation to the mobile security. It is
crucial that the users remain aware of the basic security tools available like endpoint firewalls,
anti-spam and anti-virus.
Document Page
Legislative and legal consideration
In Australia, the government is the focus on the threats in relation to the telecommunication
technology and its related threats and take all necessary measures to minimise such threats. In
this context, there are several laws and legislationis enacted by the government of Australia to
overcome the threats in relation to the telecommunication in all over the country. This step of the
government not only protects the users and the businesses from the loss of private information
but also assist in determining the ways and restrictions that assist to take appropriate measures in
relation to such security. In this context, there are several laws and legislation that are formulated
by the government to provide security to users and businesses against mobile phones are
mentioned below:
Surveillance Devices Act 2004
This act is enacted to regulate the use of the devices of surveillance by the agencies of the
enforcement of laws. This act allows the several activities of surveillance that are conducted
under the warrant. This act imposes over the requirements for the storage of security and records
destruction, publication and communication of the information that is required and obtained from
the use of devices of surveillance. This act also obliged the agencies of law enforcement to
maintain the appropriate level of safety and transparency.
Listening Devices Act 1992
This act is accountable for the use of the listening devices in the country of Australia. This act
does not regulate the other devices of surveillance like tracking, data surveillance devices and
optical surveillance (Vaidya, et. al., 2018). This act protects against those listening devices which
are used to listen to the private and secret information of others.
Privacy and Personal Information Protection Act, 1988
The role of this act is crucial in maintaining the privacy of the information which is assessed by
electronic devices like computer, mobile phones and other like devices. This act assists in
providing safety of the information of private nature. According to Thibodaux& Walker, (2015),
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]