ISYS 326: Critical Analysis of Mobile and Wireless Security Issues

Verified

Added on  2023/06/03

|13
|3312
|461
Report
AI Summary
This report provides a comprehensive analysis of mobile and wireless security issues, highlighting the increasing threats and risks associated with mobile devices and wireless networks. It identifies various security threats such as denial-of-service attacks, traffic analysis, eavesdropping, spoofing, and captured and retransmitted messages. The report also delves into mobile device-related security issues, including pull attacks, push attacks, forced de-authentication, multi-protocol communication vulnerabilities, and risks associated with mobility and disconnection. Furthermore, the report outlines several methods to improve mobile and wireless security, such as encryption, adherence to security standards, network access control processes, access control measures, and memory randomization techniques. It emphasizes the importance of avoiding third-party software and applications and implementing strong password and biometric systems to protect personal data. The report concludes by recommending proactive security measures to mitigate the identified threats and ensure the confidentiality, integrity, and availability of mobile and wireless networks.
Document Page
Mobile and wireless security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MOBILE AND WIRELESS SECURITY
1
Executive summary
In the last five years the size of mobile and wireless networks has reduced and many
advanced technologies are developed by which users can share data for long distance.
There are many kinds of mobiles devices produced by information technology, for
example, smartphones, laptops, PDA, data storage devices and other wireless devices.
The main problem associated with these mobile devices is security related issues which
are increasing very quickly. This report identifies the security threats and risks of both
mobile and wireless devices and their impacts on human personal data. Due to this type
of issues users can lose their private data or information and they can suffer from any
financial problem. Individuals should avoid the use of third-party software and
application and protect data by using biometric and password systems.
Document Page
MOBILE AND WIRELESS SECURITY
2
Contents
Executive summary......................................................................................................................................... 1
Introduction....................................................................................................................................................... 3
Overview of mobile and wireless security............................................................................................. 3
Mobile and wireless security issues......................................................................................................... 4
Wireless security issues............................................................................................................................ 4
Denial of service attack......................................................................................................................... 4
Traffic analysis......................................................................................................................................... 5
Eavesdropping.......................................................................................................................................... 5
Spoofing...................................................................................................................................................... 5
Captured and retransmitted messages.......................................................................................... 5
Mobile device related security issues.................................................................................................. 5
Pull attacks................................................................................................................................................. 6
Push attacks............................................................................................................................................... 6
Forced de-authentication..................................................................................................................... 6
Multi-protocol communication.......................................................................................................... 7
Mobility....................................................................................................................................................... 7
Disconnection........................................................................................................................................... 7
Methods to improve the security of mobile and wireless...............................................................7
Encryption method..................................................................................................................................... 8
Standards........................................................................................................................................................ 8
Network access control process............................................................................................................ 8
Control access............................................................................................................................................... 8
Memory randomization............................................................................................................................ 8
Recommendation............................................................................................................................................. 8
Conclusion........................................................................................................................................................... 9
Document Page
MOBILE AND WIRELESS SECURITY
3
References........................................................................................................................................................ 10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MOBILE AND WIRELESS SECURITY
4
Introduction
The mobile is very imprint device for communication purpose and the use of mobile and
wireless technologies are growing very fast. The mobile and wireless security are
defined as a protection method for computer networks and personal servers from
threats and vulnerabilities of wireless systems (Aminzadeh, et al., 2015). The security of
human private data is a very common problem and in last few years, the rate of mobile
devices is increased by 50% due to which the numbers of security-related issues and
risks also increased (Butun, Morgera, and Sankar, 2014). The main purpose of this
report is to identify and analyse the IS security issues of mobile and wireless devices
and prevention techniques to avoid these type of problems. Information of any
organization is a very important key element and many consumers use wireless
networks which are very less secure due to which they can lose their privacy. This
report is explaining the mobile and wireless security issues, and challenges and process
to solve this kind of risk from computer networks. There are many kinds of securely
related issues occurs in the mobile and wireless system for examples, DDOS attack,
malware, and botnet attacks, configuration conflict, and rogue access points which will
be discussed in this report.
Overview of mobile and wireless security
Wireless is an advanced technology due to which users can transfer data or information
from one location to another. With the help of mobile and wireless networks consumer
can share their data for long distance and the main problem occur with these type of
process is data breach (Chen, et al., 2016). Mobile computing is a kind of wireless
system that has the capability to connect two or more people with the help of internet
and transmission lines. There are main two attacks occurs in the field of mobile and
wireless technologies, for example, denial of service and malware attacks. Wireless
devices involve cordless phones, satellite phones, cellular phones and smartphones like
personal digital assistants (Gai, et al., 2016). One of the main concerns in the sector of
the mobile and wireless process is data security and the main advantage of this
technology is that it is more efficient rather than wired technology. Information
technology identified that in the year 2015 the security threats of mobile devices are
increased by 37% and the main problem is lack of security by which users can lose their
Document Page
MOBILE AND WIRELESS SECURITY
5
private details like account details and login ID. This report provides an overview of
security threats and risks of mobile and wireless networks and it is identified that
consumer uses simple password system which can be easily hacked by botnet and
flooding process (He, Chan, and Guizani, 2015).
Mobile and wireless security issues
The mobile systems provide a communication channel between two or more peripheral
devices and it uses wireless technology to interconnect transmitter and receiver. Due to
wireless connectivity, there are many security issues occurs like data breach, DOS
attack, spoofing and configuration related issues. The security-related threats and
issues of mobile and wireless is categorized into two parts such as wireless security
issues and the issue regarding information (Hickey, and Freedson, 2016).
Wireless security issues
The security issues related to wireless networks occur with the help of intercepted of
their radio waves through attackers. Most of the wireless systems are completely
depended upon other various private networks that are developed by malware
software due to which users can face the data breach problem. There are following
kinds of security issues observed in mobile computing:
ï‚· Denial of service attack
ï‚· Traffic analysis
ï‚· Eavesdropping
ï‚· Spoofing
ï‚· Captured and retransmitted messages
Denial of service attack
It is the most common type of malware attack which is growing very fast and in wireless
networks, hackers can easily block user’s data. In this type of attack, hackers generate a
large number of unwanted signals and send to users personal servers (Jing, et al., 2014).
There are main two processes used in denial of service attacks for example botnet and
flooding process by which they attack human personal networks and mobile devices.
Due to DOS attacks, consumers can lose their privacy and it has the ability to reduce the
performance and security of mobile networks.
Document Page
MOBILE AND WIRELESS SECURITY
6
Traffic analysis
It is defined as a security issue for mobile networks and which is used by hackers to
control and monitor the communication systems between two or more consumers. In
which attackers first identify the IP address of the user peripheral device and after that,
they use malicious software to control communication between users. This process is
used to encrypt the personal information of users and hackers can identify the location
of the receiver and record their private data.
Eavesdropping
In this kind of security, problem hackers develop unauthentic servers and make their
party application to access users private details like login ID and passwords. The
attackers can be log on users mobile networks and can access their personal data, this
type of problem occurs due to lack of security and information was not encrypted
(Kumar, and Patel, 2014).
Spoofing
The spoofing is defined as a malware attack in which data or information is transferred
from an unauthorized server. It is a very common issue in the field of wireless
technology because wireless networks are very less secure by which hackers can access
their servers. There are many attackers which use malicious software to produce a large
number of traffic signals and they sent these traffic on authentic servers.
Captured and retransmitted messages
In this type of problem, hackers can access user personal emails and messages with the
help of unauthorized server and networks. This is a very crucial problem for mobile and
wireless networks because users can lose their personal messages and emails due to
less security. Call forwarding us a type of retransmitted process in the field of security
issues and hackers use complex algorithm to control the networks and servers of
consumers.
Mobile device related security issues
Mobile devices are very important technology in the field of information technology and
many consumers use smartphones for communication purpose. It is estimated that the
use of mobile networks has been increased by 34% in the year 2017 and the numbers of
vulnerabilities and risks also associated with these systems. It is investigated that in the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MOBILE AND WIRELESS SECURITY
7
year 2008 around 20% of security issues occurred due to mobile devices and
consumers does not use strong passwords due to which hackers easily enter into
communication networks (Liang, and Yu, 2015). In mobile computing most the
communication systems are damaged by malware, for example, Trojan, spyware, and
virus. A virus is a kind of malicious software and spyware is used to gather data or
information of the user networks without any permission. Trojan is a very important
step of any hacker that has the ability to identify and control the mobile servers and
reduced the performance of mobile devices. There are following kinds of security issues
of mobile devices are observed:
ï‚· Pull attacks
ï‚· Push attacks
ï‚· Forced de-authentication
ï‚· Multi-protocol communication
ï‚· Mobility
ï‚· Disconnection
Pull attacks
It is a type of mobile attack which is used to control the source of data and information.
Pull attack is happen when consumers download third party applications which are
developed by malicious software.
Push attacks
Push attack is a part of a malware attack that provides a platform to generate a
malicious code for mobile devices. This type of method is used to hack the personal
information of any mobile device and malicious algorithm detects the IP address of
communication networks and blocks users peripheral devices (Sgora, et al., 2016).
Forced de-authentication
Most the hackers use flooding and botnet process to drop the mobile connection and
reconnect the unauthorized servers. When any person uses unauthentic websites and
third-party software then attackers store their account details with the help of malware.
After that, they produce their devices between the mobile and communication
networks.
Document Page
MOBILE AND WIRELESS SECURITY
8
Multi-protocol communication
In this modern generation, most the mobile devices are operated on multiple protocols,
for example, cellular networks. It is identified that most of the network protocols have a
security hole which is one of the drawbacks of mobile devices that helps the hackers to
access their data.
Mobility
The mobility of user’s data increases the various kinds of mobile threats and risks in the
location of consumers (Sicari, et al., 2015). Therefore, it has the ability to replicate the
profile of users at a different location to allow data roaming. It produces the repetition
of sensitive data or information on unauthorized websites which expend the security
risk and threats.
Disconnection
It is a very common problem for mobile and communication system because mobile
devices use a wireless system to transfer data that increase various kinds of distortion
and security threats. When the mobile signals cross the different places then it
generates a frequency disconnection which is caused by third-party software and
malware algorithms.
Methods to improve the security of mobile and wireless
There are many techniques developed by information technology to address the threats
and risks of mobile and wireless devices, for example, identification and authentication
process (Zhou, et al., 2017). The securities of mobile devices are very complex because
most consumers use third-party application due to which they can lose their privacy.
One of the best security steps for mobile networks is maintaining and controlling of
modern update of servers and their software. There are following types of security
techniques and methods can be used for mobile and wireless security:
ï‚· Encryption
ï‚· Standards
ï‚· Network access control solution
ï‚· Control access
ï‚· Memory randomization (Zou, et al., 2016).
Document Page
MOBILE AND WIRELESS SECURITY
9
Encryption method
It is a very important and common technique to reduce the security-related threats of
mobile and wireless devices. In which an information or data is converted into a form of
code that cannot be hacked by attackers. Many organizations use this technology
because it has the ability to improve the efficiency of mobile computing. Encryption
process also contributes to the security-related aspects of integrity and confidentially.
Standards
Is should ensure that the mobile and wireless networks are protected from antivirus
and firewall software because hackers enter into mobile devices with the help of
malware attacks. There are many other security plans identified by which users can
secure their personal data like locking, passwords based system, biometric systems and
backups (Zhang, et al., 2017).
Network access control process
This is a type of process which is used to identify which kind of mobile devices trying to
interconnect with the networks. The main aim of this method is to provide security of
users private data from malicious and botnet attacks that can damage their
communication systems.
Control access
The control access of any mobile device depends on the location of any consumer and it
provides many security models and approaches that can control and monitor the
security issues and problems.
Memory randomization
It is also called as address space layout randomization that protects human personal
data from malicious attacks. It first identifies the unwanted signals and unauthorized
servers from computer networks and provides a platform to secure users private details
like login ID and passwords (Wu, et al., 2016).
Recommendation
It is recommended that the problem of mobile and wireless security is very common in
the field of computer science. These types of problem can be resolved if users adopt
more advanced security programmes and plans like cryptography, firewall software,
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MOBILE AND WIRELESS SECURITY
10
and robust technology. Due to malware attacks, users can suffer from the financial
problem because hacker first stores their private data and after that, they communicate
with users by social media and demand money (Singh, Singh, and Duhan, 2014). It is
identified that most customers use only simple protection methods if they use biometric
recognition system like fingerprint and iris then they can reduce this type of issues from
mobile networks. Therefore, it is ensured that consumers use only authentic servers
and websites and keep their private details secure by using authorized servers.
Conclusion
Mobile and wireless both are very advanced technologies that provide a medium to
transfer data from one location to another. Many consumers use mobile devices to share
their ideas and data but it increases many security risks like data breach, DOS and DDOS
attacks, and malware attacks. This report described the various kinds of security issues
and problems of the mobile and wireless system and their prevention methods.
Therefore, people should adopt protection techniques like encryption, cryptography
and firewall software to improve the security of data. Users ensure that they block the
unwanted signals and emails from their mobiles because hackers send fraud emails to
users and collect personal data.
Document Page
MOBILE AND WIRELESS SECURITY
11
References
Aminzadeh, N., Sanaei, Z., and Ab Hamid, S.H., (2015) Mobile storage augmentation in
mobile cloud computing: Taxonomy, approaches, and open issues. Simulation Modelling
Practice and Theory, 50(4), pp.96-108.
Butun, I., Morgera, S.D. and Sankar, R., (2014) A survey of intrusion detection systems in
wireless sensor networks. IEEE communications surveys & tutorials, 16(1), pp.266-282.
Chen, M., Qian, Y., Mao, S., Tang, W. and Yang, X., (2016) Software-defined mobile
networks security. Mobile Networks and Applications, 21(5), pp.729-743.
Gai, K., Qiu, M., Tao, L. and Zhu, Y., (2016) Intrusion detection techniques for mobile
cloud computing in heterogeneous 5G. Security and Communication Networks, 9(16),
pp.3049-3058.
He, D., Chan, S. and Guizani, M., (2015) Mobile application security: malware threats and
defenses. IEEE Wireless Communications, 22(1), pp.138-144.
Hickey, A.M. and Freedson, P.S., (2016) Utility of consumer physical activity trackers as
an intervention tool in cardiovascular disease prevention and treatment. Progress in
cardiovascular diseases, 58(6), pp.613-619.
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., (2014) Security of the Internet of
Things: perspectives and challenges. Wireless Networks, 20(8), pp.2481-2501.
Kumar, J.S. and Patel, D.R., (2014) A survey on the internet of things: Security and
privacy issues. International Journal of Computer Applications, 90(11), P. 3.
Liang, C. and Yu, F.R., (2015) Wireless network virtualization: A survey, some research
issues, and challenges. IEEE Communications Surveys & Tutorials, 17(1), pp.358-380.
Sgora, A., Vergados, D.D. and Chatzimisios, P., (2016) A survey on security and privacy
issues in wireless mesh networks. Security and Communication Networks, 9(13),
pp.1877-1889.
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., (2015) Security, privacy and
trust in the Internet of Things: The road ahead. Computer networks, 76(5), pp.146-164.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]