Answer & Explanation:Please edit this asap.Mobile Devices Security (Updated).docx
mobile_devices_security__updated_.docx
Unformatted Attachment Preview
Mobile Devices Security
[Type the document subtitle]
[Pick the date]
[Type the company name]
[Type the author name]
Security Issues Concerning Mobile Devices
The following security issues are concerning with the mobile devices:
Documents Attack: The attacker can hack the documents stored on the device also can
download all files attached to the e-mail. These documents can be lost due to such a potential
attack and its lead to high security risk for mobile transaction.
Lack of Wireless Network Security: Wireless networks are not more secured for commercial
transactions because these type of network use air as a media and its open source media and can
be used and accessed by attacker easily therefore mobile devices are not recommended to do
commercial transactions.
Credentials: Cached credentials can be stored and updated in another person application which
he/she is using for the same purpose. And its lead to big security risk in mobile devices for
commercial transactions.
Malicious Android Software: there are many persons who are developing malicious android
software’s and uploading to the Google android market to get unauthorized access to financial
resources of any user in the world using that malicious android software.
BlackBerry Phone Snoop: This is an malicious mobile application installed on the BlackBerry
phones and this application make able to get unauthorized access to your BlackBerry phones and
monitor all the incoming and outgoing traffic and also your calls.
Mobile devices Operating Systems: An operating system in mobile device is not having
advance and more security features so that’s why there is need to install other software’s on the
mobile device to enhance the security such as anti-virus, anti-spyware etc.
Lack of Control: Mobile communication system is not having proper and full control through
the mobile device, mobile device user is free to use his/her mobile anywhere for any purpose and
there is no proper checks and filter to make it fully controllable. Mobile devices have less
memory and CPU processing power than PC. Mobile devices have less network connectivity
options and bandwidth capacity. Mobile devices have limited operating systems. Mobile devices
and almost all cell phones depend on the internal smart card reader (SIM). Mobile devices have
limited slots than PC. Mobile devices needs high level security features to make commercial
transactions.
How can you address these security concerns of Mobile Devices?
There is one simple way that you have to just ignore the device. Finally you have to think that,
Bring Your Own Device (BYOD) is not concerned with the device but It’s concerning about the
data stored on the mobile device. Mobile devices are being used to access data stored on mobile
devices hardware. Attempting to control all the end- user device in your organization will only
overwhelm as you are previously busy Information Technology department.
The controlling your data should not be your focal point or center of attention but you has to
think of it in this way that “mobile devices should be the doorway and not the destination.”
Because it provides simple and secure way to the end-user for accessing data by using these
mobile devices and not to store the on mobile device itself.
You have to develop your web application programs which will be just like the smartphone web
apps and methodology provide simple and secure way to the employees of the company for
accessing the data on their mobile phones and tables. There are some other benefits which are
can be provided to your business by using this methodology such as.
You control the data – You can easily control your data with the assurance of security and
privacy because your data is securely stored in your database system and there is not any data
stored on the employee mobile device.
It works on all devices and platforms – These web applications will work on all mobile
devices as well as on all operating systems while on the other hand you can see that the native
applications are different from these web applications because they only run on specific
operating systems and also specific mobile device hardware but the web applications can support
all mobile devices and platform.
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more