StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Mobile Security Issues - Research Proposal Example

Cite this document
Summary
This paper 'Mobile Security Issues' has presented a detailed analysis of mobile security issues. This paper has discussed a number of security issues from different perspectives. This paper has also talked about the issues raised by BYOD trend…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Mobile Security Issues
Read Text Preview

Extract of sample "Mobile Security Issues"

Download file to see previous pages

At the present, people like to use mobile in carrying out a variety of tasks that were once carried out using the computers and laptops. In other words, the technology has become more and more ubiquitous. The use of mobile devices such as iPads, iPhone or tablets offer a large number of advantages for all kinds of people. These devices can be used for various purposes such as entertainment, for business tasks or communication. In this scenario, these devices provide a number of benefits. On the other hand, these devices also raise a variety of security issues for business organizations and individuals.

This paper has presented a detailed analysis of mobile security issues. This paper has discussed a number of security issues from different perspectives. For instance, what security issues can occur due to software, or network service or physical threats? This paper has discussed various types of all these issues. This paper has also considered the concept of “bring your own device (BYOD)”, which is a latest emerging business trend. This trend allows business employees to bring their devices for carrying out official tasks.

This paper has also talked about the issues raised by BYOD trend. This paper has also presented recommendations to deal with these issues. 26 Works Cited 27 Introduction This era is known as the era of information and communication technologies (ICTs). In the past few years, there have emerged a large number of innovative ICT based tools and technologies. Without a doubt, these innovations and advancements of information technology have brought a large number of opportunities and benefits for business organizations and individuals.

In other words, these devices have become more ubiquitous. Though these mobile devices are smaller in size but they encompass powerful computing capabilities, which allow business organizations and individuals to carry out their daily tasks regardless of their location and time limitation. In fact, these devices also integrate a wide variety of functionalities and applications to carry out a number of tasks. 

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mobile security' (cell phones, laptops, tablets) Research Paper”, n.d.)
Mobile security' (cell phones, laptops, tablets) Research Paper. Retrieved from https://studentshare.org/information-technology/1475523-mobile-security-cell-phones-laptops-tablets
(Mobile security' (cell Phones, Laptops, Tablets) Research Paper)
Mobile security' (cell Phones, Laptops, Tablets) Research Paper. https://studentshare.org/information-technology/1475523-mobile-security-cell-phones-laptops-tablets.
“Mobile security' (cell Phones, Laptops, Tablets) Research Paper”, n.d. https://studentshare.org/information-technology/1475523-mobile-security-cell-phones-laptops-tablets.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mobile Security Issues

Mobile Service Usage in Developing Countries

The research will focus on the issues, importance and limitations of the various avenues where mobile phones are used in learning or in financial services.... The focus of this paper will be on the different types of mobile learning and financial services used in different developing countries of the world.... Some examples include, learning using mobile phones by accessing online databases and distance learning programs.... … As the essay declares mobile phones can be classified as the invention of the century, with more and more functions being available on the cell phones people are used to performing various tasks using their mobiles....
9 Pages (2250 words) Research Proposal

The impact of mobile devices on Cyber Security

The proposed study "The impact of mobile devices on Cyber security" reveals the potential interaction between mobile devices and Cyber security.... The topic can be also related to the Criminal Justice in the following way: the violation of Cyber security has a series of legal consequences for the violator.... The proposed topic has been developed in the context of a research developed in regard to Cyber security.... As an aspect of the IT discipline, Cyber security is highly analyzed through existing literature....
4 Pages (1000 words) Research Proposal

The Impacts of Mobile Devices on Cyber Security

The study “The Impacts of Mobile Devices on Cyber security” aims at finding out the impacts of mobile devices such as smartphones, tablets, and iPads, on cybersecurity.... Gaoyue (2013), the senior colonel of Nautilus Institute for security and sustainability, argues that the common uses of the internet include purchasing items in online stores, downloading music, sharing information on social media platforms such as Facebook, Twitter, and LinkedIn, paying electricity and water bills, and accessing television networks....
8 Pages (2000 words) Assignment

The Development of Security Domains

Moreover, the report will also provide details about the procedure based on which information system and security issues are maintained.... In this respect, the digitalization of data has further raised issues relating to online security.... The paper 'The Development of security Domains' presents the rate of internet access which has augmented at a significant pace in the global context.... hellip; In the present modern era 'Information security Management', has been one of the most crucial factors with the help of which organizations can ensure their efficiency and effectiveness....
17 Pages (4250 words) Term Paper

Mobile Application Security Issues

The paper "Mobile Application Security Issues"  overviews Mobile Security Issues associated with all layers of the 'OSI model',  recent threats along with their behavior and triggers that led them to successfully breach the network or mission-critical data of an enterprise.... We will address all these issues in this study backed by surveys, reports that will demonstrate advanced threat modeling examples and their mitigation, implementing effective controls for preventing mobile application security breaches....
12 Pages (3000 words) Case Study

Wireless PKI Security and Mobile Voting

This paper ''Wireless PKI security and Mobile Voting'' explains the components and operation of the wireless public key infrastructure technology.... nbsp;… It further highlights the operation, security and risks of the wireless PKI.... The technology has the ability to support critical security functions including e-voting, digital signing as well as bank transactions (Tepandi, Vassiljev and Tahhirov, 2010).... Although the ID-PKI technology has its advantages security wise, it poses a challenge in that it requires an ID card reader and a computer....
6 Pages (1500 words) Research Paper

Security Issues in Wireless Mobile Communication

This coursework "security issues in Wireless Mobile Communication" describes Wireless mobile communications.... nbsp; There is a need to inform users of mobile devices about the security issues they face without making them afraid.... Mobile operators must ensure that data transmission is secure and private so as to security issues coming up.... security issues and privacy is becoming more outstanding with wireless mobile networks....
7 Pages (1750 words) Coursework

Privacy in Mobile Social Networking

There are so many security as well as privacy issues, which have risen up as the innovation in technologies advances hence the need for the implementation of the solutions for these problems.... It should be noted that currently, some of the application demands that the mobile uses have to put some security settings on some of the most private as well as specific application (Barkhuus, 2004).... This is because due to the technology advancement, some people are very well able to hack into the user's accounts thereby compromising their own personal security....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us