StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security in New Generation Cell Phones - Research Paper Example

Cite this document
Summary
The purpose of the essay “Security in New Generation Cell Phones” is to examine the rise in the security risks in different ways. Both the new and future generations of cell phones require the setting up and update of security software…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Security in New Generation Cell Phones
Read Text Preview

Extract of sample "Security in New Generation Cell Phones"

Security in New Generation Cell Phones Cell phones and other mobile devices accessories play a major role in the information technology revolution to the present generation. Cell phones have earned their rightful place in the technology market because of their portability and accessibility. As a result, several mobile technology manufacturers are competing to fit their cell phones with the most advanced internet software to roll out the process. Companies like LG, Nokia, Samsung, Sony, and Motorola are designing smart phones with 4G mobile networks to speed up internet reception and use. Technology in every new generation provides major improvements from the previous generations. In the cellular communications, there was first the 1G and 2G generations. These generations contributed to the provision of the internet for the mobile phones though the 3G dominated the scene. The third generation cell phone internet had advancements that made it stand up from the earlier versions of 1G and 2G. The 3G had the capacity to converge voice and the data with the wireless internet. This makes it suitable for transmitting data in high quantities. Additionally, migration towards the 4G technology has been witnessed. Regardless of these processes and developments, the security of cell phone remains paramount. Ensuring the security of the cell phones The continuity in the manufacturing and distribution of cell phones leads to the rise in the security risks in different ways. Users of electronic gadgets like cell phones should be more concerned about their safety. Lately, electronic devices such as the Apple’s iPhone latest version and the Google’s Android have committed themselves to the manufacturing and development of cell phones with 3G networks so that they possess the same features and functions of computers. Although this promotes great conveniences, it also comes with severe security risks. Both the new and future generations of cell phones require the setting up and update of security software. This software include firewalls, anti-virus software, operating system patches, anti-spam software, file encryption, and the anti-spyware software. This requires the observance of the basic home computer internet safety and guidelines. The revolution in the field of information technology has enabled most financial institutions to adapt mobile banking technologies to enlarge their customer bases. Cell phones users are required to conduct their business and financial transactions online. As a result, they will need to store their login passwords with the information pertaining to their credit card and personal details. With this trend, there will be more cases of online fraud, identity theft, more spam, digital forgery, data theft, and any other cyber crimes. Besides, it can also lead to the denial of disseminated service attack. This has the risk of disabling the network service supplier. Additionally, cell phones are prone to theft based on their portability compared to desktop computers. Since most theft cases occur unexpectedly, a cell phone user can lose a lot of information and data stored in the mobile device. In the event that the mobile device contains business and financial information of the user, the thief can use it to defraud the user of his or her finances. This is a major security concern. Additionally, the new generation cell phones come with applications that display the user’s location and movements. One such application is the opt-in text advertisements that give information on the whereabouts of the user round the clock. Hacker stalkers can use this information to trail their victims and even do felony acts to them. The new generation cell phones perform multiple things at the same time. One can use his or cell phone to do online shopping, communicate with friends, browsing the internet, and downloading ringtones, applications and programs. The implication of these is the persistent internet traffic. This opens doors for cyber criminals who look forward to making profits from the lucrative enterprise of circumventing safety protections for used in electronic devices like cell phones. Currently, there is an ongoing research on the development and distribution of software called malware. There is an assumption that the software has the capability of decongesting the internet traffic. However, the main driving force for the development and distribution of the software is to take advantage of cell phone users’ miseries and make huge profits out of it. Major issues surrounding mobile platform security Cell phone internet uses the wireless communication technology. Compared to wired transmissions, wireless communications are less secure. Since signals pass through the airwaves, intercepting them is easy especially by the use of a receiver or a transmitter (Zheng & Ni, 2006). The interception of wireless transmission signals in almost impracticable. The only way of avoiding this is encrypting the signals. This will render them useless to unlawful users. However, only the 3G and 4G mobile generations have the encrypting possibilities. The security issues at the forefront in the development of new technology cell phones include network limitation access and the user verification. Additionally, the utilization of different items by providers the user centered design bases pose fresh security challenges. The new generation technology cell phones such as the 4G use the wireless network, and this makes it more vulnerable. The vulnerability comes about from the invisible access, shared nature of the internet, unclear access and the state of natural broadcast. The development of wireless networks requires the consideration of various aspects. These include their capability to perform in devices with limited capacities, the states and the requirements of different users and the issues of the battery. However, the proposed network for operation for the 4G networks is heterogeneous in nature. This makes the systems become more vulnerability. The ability to allow for the availability of multiple connections ensures systems evaluation. This can help in recognizing the vulnerabilities. The cell phone wireless networks get connections to diverse interfaces by numerous providers. This makes the cell phone devices vulnerable to attacks from other connections. Therefore, at different intervals the driver related codes would attack the protocols of communication, and signal and transportation stacks. They will also attack such installed applications as updates features and file sharing. The erasure and deactivation of the cell phone devices is one of the surest ways of addressing these security issues to use them in multiple fronts again. The major security issue with the new cell phone generation technology is the lack of essential and practical applications for securing the systems against risks. The new generation cell phone technology allows for the use of more services in a unitary architecture. This can allow for the use of quality and sufficient service. However, when movement occurs towards an architecture that is user oriented will lead to the diversification and easy accessibility of the internet protocols. This makes the management and development of the relevant technology by the internet providers difficult. Conclusion The new generation cell phones have marvelous and attractive features that appeal to most users especially the youths. Additionally, they continue to revitalize the banking and communication industries. However, they also come with various security risks discussed above. There is need for combined and coordinated efforts from three groups of people to ensure the safety in the new generation cell phones. These are the cell phone manufacturers, the mobile service providers, and the users of the cell phones. On their part, the manufacturers should ensure the provision of a power source such as a battery the heavy load use that the cell phone handles each day. Besides, their cell phones should come along with the necessary software for protection against various security risks. The mobile phones provider in their part should restrict the transmission of services between communication lines that involves the use of infected cell phones. This will help to prevent huge denial attacks of the service in their network. Everybody using a cell phone must ensure that his or her personal safety becomes the first priority. The main reason why cyber criminals succeed in defrauding the new generation cell phone users is the lack of security of the users, communications, and transmissions of bulky data and the frequent and regular use. The users also need to follow the basic internet rules of safety. One such rule requires the internet users to disconnect the internet connectivity when not in use. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security in New Generation Cell Phones Research Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1465202-security-in-new-generation-cellphone
(Security in New Generation Cell Phones Research Paper)
https://studentshare.org/information-technology/1465202-security-in-new-generation-cellphone.
“Security in New Generation Cell Phones Research Paper”, n.d. https://studentshare.org/information-technology/1465202-security-in-new-generation-cellphone.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security in New Generation Cell Phones

Evocative Object Issues

Some of the most common and advanced information and communication technologies include cell phones and computers (Seyler 21).... Indeed, there are different versions of computers and cell phones with variant applications that continue to flood the global market.... The use of cell phones is growing in the modern world due to the friendly, effective, and advanced applications they contain.... There with just a click on my phones keyboard the goggle maps directed me on the shortest direction from the airport to the school free of charge....
4 Pages (1000 words) Essay

Bag Phone to Smart Phone

1st generation cell phones.... The conception of cell phones is traced to the creation and innovation of police cars, taxi cabs, and other service motor cars whereby the radios enabled the police officers and taxi cabs to communicate with each other or a with the central station.... Communication technology of cell phones can be traced to individuals that had special radios patched on a phone line through a live operator when making a phone call....
9 Pages (2250 words) Assignment

Tell u later

The increased customers' demand has forced the companies to keep on producing innovative products to gain market share and improve its brand image. Nokia has face severe challenge… Even though windows phones has potential future prospects but currently the market share is only 3% whereas the market share of Android is 80%. The global political framework has put significant effect The company has faced several political issues that have deteriorated its financial position and brand image among its peers....
18 Pages (4500 words) Lab Report

Journalism, Mass Media and Communication

Thus, internet and cell phones mostly work together in unison.... This paper talks about the historical development of both the internet and the cell phones and notes some crucial aspects and notable landmarks in the history of telecommunication.... cell phones use is ubiquitous with roughly 6.... Mobile phones form a very powerful tool for communication as well as internet access.... … Mobile phones can also be used to track ones location, contacts and other daily activities in what is known as security surveillance....
9 Pages (2250 words) Term Paper

Cellular Network and Smart Phone Application Security

Compared to previous 1G networks that were analog, 2G offered digital encryption and started the data service for cell phones including text messages.... 2G is also a cell phone network protocol.... he third generation succeeded in the GSM standards.... Numerous applications present in smartphones have raised new security questions.... Crackers and malicious users have become a great threat to security and are constantly trying to find loopholes within new secure systems....
7 Pages (1750 words) Case Study

How Have Cell Phones Changed Us Socially

This paper ''cell phones'' tells that cell phones were introduced into human society in the 1940s, although the early mobile phones were bulky.... This era saw the invention of prepaid cell phones, which were relatively fast.... The fourth and the present generation of mobile phones is characterized by cell phones all- IP networks.... ased on the research findings, evidence shows that cell phones have changed people's social lives....
8 Pages (2000 words) Report

Cultural Artifact Analysis

From the paper "Cultural Artifact Analysis" it is clear that the dynamic of cell phones are under constant change.... hellip; Contemporary cell phones are equipped with GPS, internet facilities and have such downloadable applications which can provide a lot of learning for the younger generations.... However, with changing times the use and ownership of cell phones changed dramatically.... lthough, cellular phone technology was invented to aid in communication the modern use of cell phones has changed dramatically....
5 Pages (1250 words) Research Paper

Mobile Phones Advancement

ntroductionMobile phones or cell phones have been one of the key technological advancements of the 20th century.... From the big cell phones installed on cars, to the current smartphones, the mobile industry has undergone a complete metamorphosis, which one can describe only as 'Revolutionary'.... This report "Mobile phones Advancement" presents mobile phones that have been one of the biggest technological advancements of the 20th and 21st Century....
9 Pages (2250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us