StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Effects of Mobile Devices on Cybersecurity - Essay Example

Cite this document
Summary
"The Effects of Mobile Devices on Cybersecurity" paper argues that mobile devices can have potentially negative effects on cyber security. Since people use their smartphones to store vast amounts of confidential data, smartphones have become a rich target for hackers. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
The Effects of Mobile Devices on Cybersecurity
Read Text Preview

Extract of sample "The Effects of Mobile Devices on Cybersecurity"

The Effects of Mobile Devices on Cybersecurity Introduction People today lead a strict-scheduled life, and therefore time is paramount in their life. According to Musara and Fatoki (2010), in order to make optimum utilization of time, modern people increasingly rely on the convenience and flexibility provided by advanced technologies. In this regard, using mobile devices such as cell phones, smartphones, tablets, and e-reader has become the integral part of modern life. Although mobile devices can have a significant influence on today’s lives and they can provide the users with greater level of convenience, they pose serious threats to cybersecurity in the context of growing hacking challenges and cyber attacks. Use of Mobile Phones in the Current World The development of the mobile technology has significantly changed the way people live. It played a notable role in making modern life convenient and flexible. The mobile technology grew rapidly that it took hardly ten years to enter the mainstream use, and, when compared to the growth of telephones this growth was unusually fast. According to Cisco’s 2013 global mobile data forecast (2014), today the number of mobile devices equals the number of humans on the planet. The mobile technology fact sheet published by the Pew Research Center (2014) indicates that 90% of American adults own a cell phone, 58% of them own a smartphone, 32% own an e-reader, and 42% own a tablet computer. It is interesting to note that 67% of cell phone users check their phones frequently for calls, messages, or other alerts when while their phones do not ring or vibrate. There are another 44% of cell users sleeping with their phones next to the bed so as to make sure that they do not miss any call, message, or update. The fact sheet also reflects that 29% of cell users consider their cell phone as “something they cannot imagine living without” (The mobile technology fact sheet, Pew Research Center, 2014). Importance of Cyber Security The term cybersecurity refers to the process of providing security to devices such as computers, cell phones, smartphones, and tablets, as well as the whole internet. In the current world, promoting cybersecurity is of great importance because modern people increasingly depend on computer networks to store and transfer their confidential data/information. Magid (2014) says that since such sensitive personal data is exposed to computer networks, hackers or other cyber criminals may intrude into the privacy of network users and empty their bank account if proper cybersecurity measures are not in place. Business enterprises are no exception to such cyber challenges. Hence, individuals and organizations are paying specific attention to enhancing cybersecurity in order to protect their confidential data and to get rid of the threats posed by cyber criminals. Effects of Mobile Devices on Cybersecurity The fast growing use of mobile devices poses crucial threats to cybersecurity mainly because most of the users are not really aware of their safe use. In addition, massive numbers of malwares and malicious links are created by hackers each day with intent to crush cybersecurity system and to gain unauthorized access to user accounts. According to Mathew Solnik (as cited in Yardon, 2014), a security consultant at Accuvant Inc, many of the new features introduced by smartphones appear to be a potential frontier in cybersecurity. He says that smartphones are rich targets of hackers because they can store immense amount of data including captured pictures and videos, recorded conversations, and credit card details. As the author points out, smartphones are connected to internet very commonly but are updated less frequently and this situation increases smartphones’ vulnerability to cyber attacks (Yadron, 2014). According to a 2013 global survey of 790 IT professionals conducted by Check Point (2013), 53% participants (up from 47% last year) responded that sensitive customer information are stored on mobile devices (Check Point). The cell internet access data as of 2013 indicate that 63% of the adult cell phone owners used their phones to access internet (Pew Research Center). When a lot of information is stored on a device that is connected to a network constantly, the device is more likely to be targeted by cyber criminals. Solnik argues that he can access a smartphone from 30 feet away without the permission of the user or the phone company. He continues that he can then turn that smartphone into a live microphone, read the text messages, and check other contents in it. Solnik tells that he can fraudulently act as the phone company and trick the phone into believing it using a fake cellphone tower which could be acquired for less than $1,000. This fake cell tower with the size of small laptop is able to upload malicious code on the phone from 30 feet distance or closer. He also adds that using this fake cell tower, he can control microphones, cameras, and apps installed in the phone (cited in Yadron). The widespread use of mobile devices tends to compromise the cybersecurity of corporate networks, and the situation in turn may lead to data theft and huge financial losses. Malatesta and Swanson (2015) point out that the Bring Your Own Device (BYOD) policy permitting employees to bring their own mobile devices to their workplace in order for using them to access the company network seems to be a serious threat challenging cyber security (p.109). Nearly 96% of the participants responded to the Check Point survey (2013) that the number of personally owned mobile devices connecting to corporate networks is increasing. This survey also found that securing corporate information is the greatest challenge of BYOD policy (Check Point, 2013). Although the employees may not use the company data deliberately to trap the company, the corporate information stored on employees’ mobile devices may be leaked under certain circumstances. For instance, this may happen in case the devise is lost or stolen or malicious applications are downloaded to the device. If the employees’ personal devices are not updated regularly, they would be prone to virus attacks and such devices may crush the firm’s cybersecurity mechanisms once they are connected to the corporate network. The Check Point survey also makes it clear that careless employees pose greater security threats to the corporate network than cyber criminals. A significant percent of the employees are not alerted of the consequences that their personal mobile devices can have on the firm’s cybersecurity. It is identified that people tend to install less costly antivirus in their mobile devices that are often ineffective at addressing the latest security threats. In short, thoughtless use of mobile devices can seriously hurt the cybersecurity of corporate enterprises. However, it is important to note that mobile devices can have some positive effects too on the cybersecurity. The most significant positive effect is that mobile devices, specifically mobile phones, can assist users to increase the security of their bank transactions. As Shashank, Ankita, Aditi & Kavita (2014) indicate, today bankers give their clients a one-time password (OTP) via their cell phones for completing a financial transaction more securely. This facility helps the banking institutions to ensure that the request to perform a fund transfer or a bill payment is forwarded by none other than the real account holder. With the development of the portable mobile devices, today people can browse internet or operate bank accounts even while they are on the move, and hence they do not have to depend on internet cafes to check/send e-mails or to manage financial transactions. It is obvious that the degree of cybersecurity threats such as phishing and key logging is high when people use public computers to access their e-mail accounts or bank accounts. In many online transactions, personal verification of the user ID would be easy for service providers if the user has a mobile device such as cell phone. Personal reflections (150 words will constitute this portion) It is a persuasive essay because this paper has took a particular position that mobile devices have potential negative effects on the cyber security and these negative consequences outweigh all positive outcomes. Conclusion From the above discussion, it is clear that mobile devices can have potential negative effects on the cyber security. Since people use their smartphones to store vast amounts of confidential data such as contact numbers, addresses, health records, and credit card details, smartphones have become a rich target for hackers. Many of the new features introduced in the mobile devices make it easier for hackers to crush the cybersecurity. In addition, the number of personally owned mobile devices connected to corporate networks by employees is growing tremendously, and this situation may lead to many severe cybersecurity issues. References Cisco Press Release. (Feb. 5, 2014). Cisco Visual Networking Index Forecast Projects Nearly 11-Fold Increase in Global Mobile Data Traffic from 2013 to 2018. Retrieved from http://newsroom.cisco.com/release/1340551/Cisco-Visual-Networking-Index-Forecast-Projects-Nearly-_2 Check Point. (2013). The impact of mobile devices on information security: A survey of IT professionals. Retrieved from https://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report.pdf Musara, M & Fatoki, O. (2010). Has technological innovations resulted in increased efficiency and cost savings for banks’ customers? African Journal of Business Management, 4(9), 1813-1821. Mobile Technology Fact Sheet. (2014). Pew Research Center. Retrieved from http://www.pewinternet.org/fact-sheets/mobile-technology-fact-sheet/ Magid, L. (2014). Why Cyber Security Matters To Everyone. Forbes. Retrieved from http://www.forbes.com/sites/larrymagid/2014/10/01/why-cyber-security-matters-to-everyone/ Malatesta, C & Swanson, J. (2015). “Cyber security and mobile devices”. Chapter 5 In Cybersecurity in Our Digital Lives. LeClair J & Keeley, G (Eds.). Hudson Whitman/ ECP. Shashank, R., Ankita, R., Aditi, P & Kavita, C. (2013). Multilayered Password Security for Banking Application. International Journal of Emerging Technology and Advanced Engineering, 3 (3), 379-384. Yadron, D. (July 31, 2014). Smartphones Become Next Frontier in Cybersecurity. The Wall Street Journal. Retrieved from http://www.wsj.com/articles/smartphones-become-next-frontier-in-cybersecurity-1406808182 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The effects of mobile devices on cybersecurity Essay”, n.d.)
The effects of mobile devices on cybersecurity Essay. Retrieved from https://studentshare.org/english/1684506-the-effects-of-mobile-devices-on-cybersecurity
(The Effects of Mobile Devices on Cybersecurity Essay)
The Effects of Mobile Devices on Cybersecurity Essay. https://studentshare.org/english/1684506-the-effects-of-mobile-devices-on-cybersecurity.
“The Effects of Mobile Devices on Cybersecurity Essay”, n.d. https://studentshare.org/english/1684506-the-effects-of-mobile-devices-on-cybersecurity.
  • Cited: 1 times

CHECK THESE SAMPLES OF The Effects of Mobile Devices on Cybersecurity

Threats to Mobile Phone Users Privacy

Physical Vulnerability Tablet computer, smartphones, and notebooks among others are mobile devices which are taken by professionals and also different individuals when they are traveling or are used at home.... Portability is regarded as a key facet of mobile computing (International Association of Medical Science Educators, n.... This report "Threats to Mobile Phone Users' Privacy" discusses significant cybersecurity vulnerabilities and related threats associated with mobile computing for the users....
9 Pages (2250 words) Report

Cybercrime: Law Enforcement and E-Government Transnational Issues

Issues that continue to challenge and thus calling for the United States' government cybersecurity intervention include the growing integration of mobile devices technology into perilous information infrastructure.... Current initiatives addressing United States' cyber security concerns include the Comprehensive National Cybersecurity Initiative (CNCI), Commission on cybersecurity for the 44th Presidency and the Obama Administration 60-Day Cyberspace Policy Review....
7 Pages (1750 words) Research Paper

The Impact of Mobile Devices on Cyber Security

This book report "The Impact of mobile devices on Cyber Security" examines the impact of mobile devices on cyber security.... For many years since the invention of mobile devices, top on the list of mobile insecurity has been identity theft, which is done by unauthorized access to other people's personal information (Shabtaiet al.... He points out that managing risks is a very important agenda that should be kept in mind by firms and businesses as they capitalize on the opportunities created by the dramatic growth of mobile devices....
9 Pages (2250 words) Book Report/Review

The impact of mobile devices on Cyber Security

The proposed study "The impact of mobile devices on Cyber Security" reveals the potential interaction between mobile devices and Cyber Security.... In addition, the popularity of mobile devices has been highly increased today, especially due to the radical development of technology on with these mobile devices are based.... However, the relationship between the Cyber Security and the mobile devices has not been adequately explored.... From this point of view, the proposed topic is considered as quite valuable, offering important information in regard to the relationship between Cyber Security and the mobile devices that have become quite popular....
4 Pages (1000 words) Research Proposal

The Impacts of Mobile Devices on Cyber Security

The research will study the impacts of mobile devices on cybersecurity in Banda town that is located in the United States.... The study 'The Impacts of mobile devices on Cyber Security' aims at finding out the impacts of mobile devices such as smartphones, tablets, and iPads, on cybersecurity.... These cyber threats have impacts on consumers and companies that use mobile devices to share information and purchase goods.... This is because the increase in the number of mobile phone users to 4 billion worldwide also increases the risks....
8 Pages (2000 words) Assignment

Cause-Effect Analysis

Unfortunately, this advanced functionality exposes these mobile devices possess vulnerabilities that make them attractive and easy targets for exploitation.... he first major cyber threat to mobile devices stems from the size and portability nature of these devices.... mobile devices are vulnerable to malware in similar ways to desktop computers.... Some of these devices include Smartphones, tablet PCs and Personal Digital Assistants (PDAs) among others....
4 Pages (1000 words) Essay

Law Enforcement and E-Government Transnational Issues

Issues that continue to challenge and thus calling for the United States' government cybersecurity intervention include the growing integration of mobile devices technology into perilous information infrastructure.... Current initiatives addressing United States' cybersecurity concerns include the Comprehensive National Cybersecurity Initiative (CNCI), Commission on cybersecurity for the 44th Presidency and the Obama Administration 60-Day Cyberspace Policy Review....
7 Pages (1750 words) Coursework

Effect of Decision Making in Cybersecurity

The significance of critical measures on cybersecurity can be evidenced by the seriousness the governments put on these issues.... The paper "Effect of Decision Making in cybersecurity" describes that decisions adopted in any organization have a huge impact.... In the case of cybersecurity, the decision taken about the system and software to be used in the organization determines how secure or vulnerable it becomes.... Decisions of having the best systems and software strengthen cybersecurity and lower the chances of intruders....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us