StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Mobile Computing and Mobile Computing Security - Report Example

Cite this document
Summary
The report "Mobile Computing and Mobile Computing Security" discusses the advantages of mobile computing technologies and features of mobile computing security. Mobile computing involves the use of computing and communications devices to transfer data and other forms of communications…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Mobile Computing and Mobile Computing Security
Read Text Preview

Extract of sample "Mobile Computing and Mobile Computing Security"

Mobile Computing and Mobile Computing Security Introduction to Mobile Computing Mobile computing involves the use of computing and communications devices to transfer data and other forms of communications even without a direct physical link between the source and recipient device (Shriraghavan et al, 2003). It is also refers to use the use of compact, portable computing devices such as laptops, pocket computers, Personal Digital Assistants (PDA's) and other similar devices that use wireless technology ("Mobile computing", 2006). Mobile computing has it's roots on radio communications in the 1950's and 60's where the use of automobiles became widespread and a need for mobile communication devices such as car radios and "walkie-talkie" radios rose to another level Communication companies like Motorola lead the way for the use of mobile communication devices. Today, a whole variety of 'mobile computing platforms' such as in-dash VGA displays and automobile computers which feature a variety of applications and functions such as global positioning systems (GPS) and radar detection systems are available for the mass market ("Mobile computing", 2006). Wireless LAN and Wireless Access Points Some mobile computing devices use WLAN (Wireless Local Area Network) as their means to communicate and acquire data. A WLAN is a LAN (Local Area Network) connected through radio or other wireless means. One of the advantages of using a WLAN is the flexibility it offers to overcome restrictions of physically connected networks to space restrictions. It is easy, wire-free and simple to use. WLAN allows data access without having to "jack-in" or plug to a wired network (Shriraghavan et al, 2003). Wireless Local Area Network (WLAN) transmits and receives data through fixed line network called access points. An area called a "hotspot" results from the area covered by each of the access points. Each access point serves numerous subscribers and they alter their 'access points' as they transfer from one point to another. As the number of access points in a WLAN increases, the size of the network also increases (Shriraghavan et al, 2003). Satellite Networks This type of network uses communications satellites acting as central points for transferring data. The subscriber uses a 'satellite dish antenna and a transceiver to transmit and receive data'. This network is usually a better alternative for rural areas where 'broadband, DSL (Digital Subscriber Line) and cable television' systems are not accessible (Shriraghavan et al, 2003). Cellular Networks The advent of mobile phones or cellular phones ushered in the creation of cellular networks. A cellular network operates by serving different frequencies or bands to handle calls and other services such as short message service (SMS). A cell site is commonly composed of 3 basic parts: a control unit, a receiver and a transmitter connected to a Mobile Telecommunications Center that is also interconnected with the public telephone systems (Shriraghavan et al, 2003). Ad-hoc and Sensor Networks An ad-hoc network results from the creation of several small nodes or "motes", tiny powered self-contained computers that are linked through radio around a small area. Motes are capable of communicating and exchanging data with each other over short distances and are usually formed temporarily. Ad hoc networks are common and have several practical military applications (Shriraghavan et al, 2003). Mobile Devices Mobile devices could include the following: Laptop computers, Personal Digital Assistants (PDAs) and handheld PCs, Pagers and cellular phones and task devices, such as bar code scanners. Laptops, PDAs and portable handheld PCs are computing devices that can run a number of programs and applications for every sort of business, enterprise and more recently for the modern home. Laptops are basically portable versions of personal computers (PCs) which equal or even rival the computing power of modern desktop units. They are similarly supported by their manufacturers in the same way as desktop units. PDA's and pocket PCs are even more compact versions of desktop PCs. They are rapidly evolving but they are not as widely supported as desktops and laptops. Both PDA's and pocket PCs are so compact and portable that a number of security issues rise from owning them. Pagers and cellular phones are mobile versions of telephone units just like desktops are to laptops. They provide a variety of applications such a voice calls and SMS and in case of unfortunate circumstances several security measures are provided by their network operators. Task devices are specialized devices such as parcel tracking devices used by FedEX and USPS and barcode readers used in supermarkets. These devices have very specific functions and are not much given significance in computing (Shriraghavan et al, 2003). Introduction to mobile computing security Security is one of the greatest problems related to mobile computing. Free access to data and the ability to access it from anywhere, anytime entails accessibility and security problems, for example, if a hacker knows the name of the site or 'IP address, then the company's system could also be access by that person and thus can be altered or worse, hacked'. This is extremely important as some of today's companies depend so much on the Internet. However, there is still the issue of denying access for undesired loggers of secured content. The best way to prevent unauthorized access is to use extensive error handling capabilities and security measures built into company web sites ("Definition of mobile computing", n.d.). Also the use of data authentication and encryption is very important for all mobile communication devices operating today. Security must also be enforced in data sharing. Data sharing among users must be monitored and at times restricted in order to prevent several security breaches. A certain amount of distrust must be applied whenever data sharing is done (UCLA, n.d.). Computers are indeed becoming more portable and convenient. Sad to say, due to their very own portability, they are prone to theft. Compromise is lessened when a certain level of distrust is applied by the host to the client and vice versa. Hosts also must carefully monitor and modify data whenever permitted and possible to enforce safety during data sharing (UCLA, n.d.). Mobile computing security The simplest technique in preventing unpleasant situations like theft and lost is the presence of mind of the user, although this kind of enforcement may inhibit user productivity which the users may not appreciate or follow. When control measures fail to protect data in the event that the device is stolen, the simplest solution is to prevent intensive and unauthorized data sharing. This may seem harsh and may also be hard to enforce but can be immensely effective once enforced. In term of other popular mobile communication devices, for mobile phones alarms and other security systems are applied by their respective service providers, but the same level of security cannot be said for other communication devices such as laptops and PDA's . (Sadlier, 2003). Hacking and cracking is difficult to arrest from inside and out. Firewalls, security devices and applications that restrict and sieve data entering and going out from the system are an effective measure to prevent or lessen the impact of hacking and cracking. Several forms of firewalls include usernames, passwords, codes and other such means to prevent unauthorized access. Probably the most common form of firewall is the combined use of user names and passwords. This kind of firewall can be both the hardest and easiest security method to crack and often companies allow users to choose their own user names and/or passwords or assign ones which are easy to remember. It is common for an employee to have a user name and/or password that is their own first name, last name, social security number, date of birth, or other vital information. Workstation authentication can also be enforced as another means of security. Login information is asked by both methods and sometimes, they are used in conjunction. Furthermore the passing and sharing of very vital information such as social security or credit cards numbers are prone to hacking and other form of attack. Encryption seems to be the best way of preventing the unauthorized access to these kinds of vital information. Encryption is done by coding the vital information into an unreadable code so that even if the information is accessed, it is encrypted in a way only the system can decode ("Definition of mobile computing", n.d.). Conclusion Today's fast paced world requires intense security measures. Hackers are the primary reasons why some people are afraid to divulge information in the internet. Most cases of internet theft and hacking occurs within and outside the company's computer system. Unscrupulous individuals have several methods in accessing company databases and as such, an effective security measure should be imposed in and out of a company. With access like this they can forge information, sell data, upload computer viruses, corrupt data, steal credit numbers, harass employees, and do other unruly acts of computer related crimes ("Definition of mobile computing", n.d.). Data, as with any other form of property must be properly cared of and protected. Nowadays not having an effective security system and enforcement means a lack of responsibility in the part of a company's structure and therefore should be seriously considered. Bibliography Arbaugh, Willian A.(2003). Wireless Security is Different. Computer 36.8: 99-101. "Definition of Mobile Computing." (n.d.). Wings.buffalo.edu. Available from: [Accessed 8 March 2006]. Kong, Jiejun, Petros Zerfos, Haiyun Luo, Songwu Lu, and Lixia Zhang.(2001). Providing Robust and Ubiquitous Security Support for Mobile Ad-hoc Networks. IEEE Nineth International Conference on Network Protocols (ICNP'01), 251-260. Miller, Sandra K.(2001). Facing the Challenge of Wireless Security. Ed. Lee Garber. Computer 34.7, 16-18. Potter, Bruce.(2003). Wireless Security's Future. Ed. Gary McGraw, and Nancy R. Mead. IEEE Security & Privacy 1.4: 68-72. Sadlier, George. (2003). Mobile Computing Security. International Network Services Inc. Shriraghavan, Sowmya, Srikanth Sundaragopalan, Fan Yang, and Jinsuk Jun. (2003). Security in mobile computing. Available from: [Accessed 8 March 2006]. UCLA. (n.d.). Security for Mobile Computing Environments. UCLA. Available from: [Accessed 8 March 2006]. Welch, Donald, and Scott Lathrop.(2003). Wireless Security Threat Taxonomy. IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 18- 20, 76-83. "Mobile computing." (2006). Wikipedia. Available from: [Accessed 8 March 2006]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Mobile Computing and Mobile Computing Security Report Example | Topics and Well Written Essays - 1500 words, n.d.)
Mobile Computing and Mobile Computing Security Report Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1513269-mobile-computing-and-mobile-computing-security
(Mobile Computing and Mobile Computing Security Report Example | Topics and Well Written Essays - 1500 Words)
Mobile Computing and Mobile Computing Security Report Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1513269-mobile-computing-and-mobile-computing-security.
“Mobile Computing and Mobile Computing Security Report Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1513269-mobile-computing-and-mobile-computing-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mobile Computing and Mobile Computing Security

Virtual Desktop Infrastructure in the Work Environment

Furthermore, they partner with mobile devices companies like Nokia, Samsung, LG and Techno among others on how users (tablets and Smartphones) can use such devices to access data stored on a certain desktop.... This paper ''Virtual Desktop Infrastructure in the Work Environment''  discusses that the technology implies the use of a single central server with relevant operating system to act as a back up to other systems through a defined network or protocol....
6 Pages (1500 words) Term Paper

Mobile Computing Technology

It is without question that mobile computing and technology have changed many of the ways in which key aspects of healthcare have been provided to the end user within the past several years.... hellip; However, within the current system, mobile computing and social networking has proven to be a paradigm shift by which almost every aspect of society is impacted.... As a function of discussing and analyzing this to a further degree, the following analysis will seek to answer for key questions concerning the prospect of engaging in further utilization of mobile computing and social networking as a means of effecting healthcare to the patient; comparing and contrasting the monitoring the patient vital signs using mobile computer technology to inpatient visits, analyzing the advantages and disadvantages of using mobile computing technology to monitor patients, assessing the security concerns with regards the transmission of personal medical information over wireless networks, and assessing the use of social networking for group support for patients with similar medical concerns....
4 Pages (1000 words) Essay

Mobile Communication 1 and 2

The challenges of limiting risk around employee-owned mobile devices are intricate and real and mobile device management solutions have proved effective in enforcing device policies such as password control, remote wiping capabilities for lost/stolen phones, and VPN.... Some of the challenges that companies encounter in adopting m-concern include compliance concerns, perception that m-commerce is insecure, lack of security, inadequate connectivity speeds, confusion over business models related to money-flows, and immaturity of technology to integrate with present e-commerce and IT-back-end systems....
3 Pages (750 words) Essay

Virtual Private Network

The power of mobile computing has revolutionized the field of Medicine and healthcare and mobile sets have become all important aids for the medical practitioners to remain connected with their patients other doctors and useful medical data twenty four hours a day and seven days a week .... nswer 2: The development in mobile technology coupled with growing mobile workforce have made mobile and cellular ubiquitous and owing to the ease of portability ,mobiles have emerged as the most useful and popular computing and communication tool ....
4 Pages (1000 words) Essay

The Current State of the Art in Mobile Computing

The paper "The Current State of the Art in mobile computing" discusses that mobile computing is an important area of electrical engineering and computer science that lead to the development of devices crucial for challenging patterns and creating new consumer and business ideas.... hellip; With the increase in the number of devices that support mobile computing technology, there is an increasing need to impose and ensure security since mobile computing devices usually store a tremendous amount of data and storage capacities are increasing with the continued shrinking of circuits and advancement in Standard State Drive (SSD) technologies....
9 Pages (2250 words) Essay

Mobile Computing and Social Networks

This essay has highlighted the work function of social networks and mobile computing.... The paper "mobile computing and Social Networks" discusses that privacy issues and hacking of important personal data and information can be considered as a serious challenge for Smartphone users.... hellip; It is important to consider the safety and security factors while transferring data and information.... Last but not the least; it is highly important for the users to change the password of devices and SIM cards on a frequent basis to strengthen the security aspect of smartphones....
10 Pages (2500 words) Essay

Mobile Computing

This paper examines mobile computing.... mobile computing has been classified into two categories; portable computing and mobility computing.... he other type of mobile computing is mobile computing which safeguards the true essence of mobility.... This type of mobile computing is preferred by end-users, therefore, it has found its place in almost every field of life.... he concept of mobile computing has grown so much that many applications are present for a diverse range of fields....
11 Pages (2750 words) Research Paper

Operating Systems for Mobile Devices

hen one talks about mobile computing, one talks about possibilities in terms of bringing more computing ability and power to more people on the go, but one also invariably talks about challenges and constraints inherent in the nature of mobile computing, and those relate to one, limitations in computing ability relative to bigger and non-mobile counterparts such as traditional PC computing; two, constraints in terms of power, that mobile computing is constrained by computing components that are underpowered or receive basically limited battery power that limits their portability and the way in which they are used for some vital tasks like online computing; three, that mobile computing is limited in that the way it connects to the web is variable in the speed that it is able to do so, with some scenarios where it is able to get of large telecommunication bandwidths, but in other cases not being able to get more than minimal connections in that regard; four that there are inherent risks in mobile computing, in that the devices are portable and therefore more prone to getting lost, to being stolen, or to being destroyed from use or from the elements, in comparison to their non-mobile counterparts, which can be secured in safe and guarded facilities, such as offices....
10 Pages (2500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us