ISYS 326: Critical Analysis of Mobile and Wireless Security, 2018

Verified

Added on  2023/06/03

|10
|615
|231
Report
AI Summary
This report provides a comprehensive overview of mobile and wireless security, highlighting the increasing reliance on these technologies and the associated security risks. It identifies key issues such as DOS and DDOS attacks, data breaches, traffic analysis, spoofing, and push/pull attacks. The report details the mechanisms of these attacks and their potential impact on users and organizations. Furthermore, it explores methods and techniques to improve mobile and wireless security, including encryption, cryptography, access control, memory randomization, and robust technologies. The report concludes with recommendations for users to enhance their security posture, such as using authentic websites, regularly updating software, and employing password-based systems. References to relevant research papers are included to support the analysis and recommendations.
Document Page
Mobile and wireless
security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
Mobile and wireless technologies are used to
share data or information from one person to
another
Security of mobile device is defined as a
process to protect users data from malicious
and other attacks
The use of mobile and wireless networks is
increased by 40% in between year 2015 and
2017 (Liang, and Yu, 2015).
Document Page
Introduction
The security of human private data is very
crucial point for an organization
The main aim of this presentation is to
highlights the security related issues and
problems of mobile and wireless systems
Due to lack of security consumers can face
the issue of data breach and they can lose
their data.
Document Page
Mobile and wireless security issues
There are following kinds of security issues
and threats occur with mobile computing:
DOS and DDOS attacks
Data breach
Traffic analysis
Spoofing
Push and pull attacks
Captured and retransmitted messages
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DOS and DDOS attacks
DOS is defined as a denial of service which is
a part of security threat
Hackers use botnet and flooding process to
block the computer networks of users
Generally, attackers produce large amount of
traffic signals and transfer on mobile
networks
Hackers send spam and fraud mails to users
and collects their private details like login ID
and passwords
Document Page
Data Breach
It is a security issue which occurs in the
mobile and wireless devices
It includes personal health information,
private data, and personally identifiable
information
In which hackers first enter into mobile
networks and then control the private details
of individuals like bank details, credit and
debit cards numbers and OTP.
Document Page
Traffic analysis
It is used to control and monitor the
communication system between mobile and
wireless networks.
Hackers identify the IP address and other personal
details by using flooding process
It has capability to reduce the performance of
mobile computing (Wu, et al., 2016).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Methods and techniques to improve the
security of mobile and wireless
Information technology has developed many
steps and techniques to reduce the security
related issues:
Encryption method
Cryptography
Control access
Memory randomization
Robust technology (Sicari, et al., 2015).
Document Page
Recommendation
It is recommended that the issues of mobile
and wireless systems can be avoided by
encryption and firewall technologies
Users ensure that they use only authentic
websites and application (Zou, et al., 2016).
They should update mobile software on
regular basis and use password based
systems.
Document Page
References
Liang, C. and Yu, F.R., (2015) Wireless network virtualization:
A survey, some research issues and challenges. IEEE
Communications Surveys & Tutorials, 17(1), pp.358-380.
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A.,
(2015) Security, privacy and trust in Internet of Things: The
road ahead. Computer networks, 76(5), pp.146-164.
Zou, Y., Zhu, J., Wang, X. and Hanzo, L., (2016) A survey on
wireless security: Technical challenges, recent advances, and
future trends. Proceedings of the IEEE, 12(2), pp.1-39.
Wu, J., Ota, K., Dong, M. and Li, C., (2016) A Hierarchical
Security Framework for Defending Against Sophisticated
Attacks on Wireless Sensor Networks in Smart Cities. IEEE
Access, 4(4), pp.416-424.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]