Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
The study "Investigating Mobile Wireless Security" focuses on the critical analysis and investigation of various mobile wireless security options. Smartphone, as the name implies, is a small device but it has more functionality than mobile phones and computers…
Download full paperFile format: .doc, available for editing
Extract of sample "Investigating Mobile Wireless Security"
An Investigation of Mobile Wireless Security
By
Author
Smart phones, as name implies that it is small device. It is small device but it has more functionality of mobile phone and computer. It is used for communication like mobile phone and computing functionality like computer. With the help of smart phone, a user can interact with different application at same time. It is so small that you can put in your pocket. You can install as many software in your smart phones as you want (Laudon & Laudon, 1999). However, these devices operate using wireless medium. In this scenario, unlike wired medium of communication, wireless computing does not require wires to be used for communication. This communication is totally based on microwaves. In fact, this way of communication is much better than wired medium for the reason that it allows us to expand our reach in those locations where wires cannot be installed. On the other hand, wireless networks are believed to be costly, slower, and more error prone than wired networks. In addition, bandwidth and energy supply in wireless devices need to be carefully considered while deployment in order to get effective working (Zhang et al., 2009; Mousionis et al., 2011; Nash, 2000).
Additionally, they require careful management from both hardware and software standpoints. The research has shown that implementing security and privacy for wireless networks is challenging for IT professionals for the reason that wireless transmission can be without problems intercepted. There is another issue with wireless networks is that data and information cannot be distributed flawlessly between various wireless networks if these networks follow mismatched standards. Hence, in light of these challenges it is difficult to implement security mechanisms for wireless networks. Basically, network security is aimed at implementing measures and mechanisms to deal with security issues and eliminate security threats. In this scenario, a threat can be anything that can cause harm to computer or network. Additionally, a threat can be simply an error, burglar or virus. However, a threat cannot be harmful to the network unless it exploits an existing vulnerability. In this scenario, vulnerability is a flaw, anything that has not been protected against threats. Hence, threats to Smartphone hardware can include a wide variety of events that can have some serious effect on the performance or working of the Smartphone (Zhang et al., 2009; Mousionis et al., 2011; Nash, 2000).
In addition, the smartphones are using widely in these days but smart phones now at risks. By receiving messages from unknown number can damage our smart phone. If we have no authentication of our smart phone then any unauthorized person can use the smart phone and damage our system. By sending MMS (multimedia message), virus can easily attack our system. When virus attacks on the system then our system suddenly halts. By web browsing the viruses in web sites damages the system. By using Bluetooth, we can receive virus from the other device. The intruder hack our system by changing. The malware damage our system by using the different program. Eavesdroppers access our frequency and change the code of our frequency. Some of the most useful techniques to secure a Smartphone from various security threats by controlling the following functionality (Zhang et al., 2009; Mousionis et al., 2011; Nash, 2000):
1) User authentication
2) Save your data from intruder(uses data encryption)
3) From the virus of memory card
4) Filtration
5) Messages from unknown location.
In addition, by using the anti-virus, we can save our smart phones from viruses. Anti-virus can easily detect the bugs from your page. Data encryption is also a technique to save our smart phone from intruder. Anti-virus stops the execution of the virus so we can save our system. Don’t open the web bugs pages because may be your anti-virus may not effective to stop the execution of virus. Ignore the invitation from any known person to join his community. Block spam because these are instant messages and may become trouble for your system (Shelly et al., 2005).
Smartphone’s Operating Systems
An operating system (OS) is system software which allows systems users to install and run other application software or programs (Silberschatz et al., 2004). Without a doubt, Smartphones are different from computers as a result a person can’t install an operating system of his own choice if he does not like the one that came along with the device. In this scenario, we can say that the most important tool or application in any smartphone is its operating system. In the smartphone, an operating system is used to deal with the software and hardware resources. In fact, the majority of operating systems deal with a wide variety of the software applications. On the other hand, remaining operation systems comprise the lower levels (normally the middleware and kernel layers) as well as depend on supplementary software platforms to offer a user interface structure, or simply known as AEE. Additionally, a Smartphone’s operating system reflects user’s lifestyle for the reason that it recognizes the options of apps and phone operations (Ziff Davis, Inc., 2013). Some of the well-known smartphone operating systems are:
Symbian
Symbian operating system is used by more than 100 different kinds of dditionally, The Symbian is based on the middleware and kernel parts of the software stack. In this scenario, some application platforms like S60, UIQ, and MOAP provide the upper layers. Up till now, this operating system is believed to be a leading smartphone operating system, with a market share of more than 51%. On the other hand, it is expected that Microsoft and Linux will successfully get more of the market share than Symbian in the coming years (Coustan & Strickland, 2013; Seng, 2013).
Linux
In view of the fact that that development of Linux operating system is driven by a community of developers instead of a central company hence Linux is only one of its kind among the other operating systems. The research has shown that operating system provide support for more systems than any other operating system exist in the market. However, up till now Sybian has been the most dominant operating system for smartphones. In fact, there are some drawbacks of Linux operating system. One of the most important is that as this operating system is an organic operating system, and its developers continuously making changes and updating it even at the kernel level, hence platforms based on Linux code can differ from one another. In addition, a number of smartphone developers feel it is risky to spend money in Linux (Coustan & Strickland, 2013; Seng, 2013).
Windows Mobile
The Windows Mobile OS is believed to be the most attractive operating system for the reason that it integrates a wide variety of software applications and stack from the kernel to the application interface. In fact, this operating system is based off of Window CE.NET technology. In addition, one of the basic strengths of this operating system is its compatibility with the Microsoft Office suite of applications (Coustan & Strickland, 2013; Seng, 2013).
Java
A small portion of smartphones comes with an operating system developed through Java programming language. In this scenario, the SavaJe OS is a Java-based system that encompasses a wide variety of features and applications varying from the kernel to the user interface structure and application suite. In addition, this operating system allows its users to customize their user interface as much as they want. Though, these java-based phones have not gained a great deal of popularity among people but it is expected that in future they can gain ground at the same time as the big boys battle for the lion’s share of the market (Coustan & Strickland, 2013; Seng, 2013).
Garnet OS
Palm OS, which is now known as Garnet Operating system integrates the features of a Linux-based groundwork with applications written for the old Palm OS. In this scenario, the Palm operating system was aimed at supporting PDAs, despite the fact that the Treo line of smartphones utilized it as well. In addition, Phones utilizing the Garnet operating system became available in 2007 (Coustan & Strickland, 2013; Seng, 2013).
Unique Operating Systems
Apple’s iPhone come with a distinction of the Mac OS, acknowledged as OS X. In addition, the RIM BlackBerry has its own proprietary OS as well (Coustan & Strickland, 2013; Seng, 2013).
References
Coustan, D. & Strickland, J., 2013. How Smartphones Work. [Online] Available at: http://electronics.howstuffworks.com/smartphone2.htm [Accessed 03 March 2013].
Laudon, K.C. & Laudon, J.P., 1999. Management Information Systems, Sixth Edition. 6th ed. New Jersey: Prentice Hall.
Mousionis, S., Vakaloudis, A. & Hilas, C., 2011. A study on the security, the performance and the penetration of Wi-Fi networks in a Greek urban area. In WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication., 2011. Springer-Verlag Berlin, Heidelberg.
Nash, J., 2000. Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc.
Seng, J., 2013. The emerging smartphone OS battle: Firefox vs. Tizen vs. Ubuntu. [Online] Available at: http://asia.cnet.com/the-emerging-smartphone-os-battle-firefox-vs-tizen-vs-ubuntu-62220705.htm [Accessed 02 March 2013].
Shelly, Cashman & Vermaat, 2005. Discovering Computers 2005. Boston: Thomson Course Technology.
Silberschatz, A., Galvin, P.B. & Gagne, G., 2004. Operating System Concepts (7th Edition). New York: Wiley.
Zhang, T., Yang, K. & Chen, H.-H., 2009. Topology control for service-oriented wireless mesh networks. IEEE Wireless Communications, 16(4), pp.64-71.
Ziff Davis, Inc., 2013. Smartphone Operating Systems. [Online] Available at: http://www.geek.com/smartphone-buyers-guide/operating-system/ [Accessed 01 March 2013].
Read
More
Share:
CHECK THESE SAMPLES OF Investigating Mobile Wireless Security
This paper ''Mobile security Issues'' has presented a detailed analysis of mobile security issues.... This paper has discussed a number of security issues from different perspectives.... Computing Capabilities 16 Internet Access 16 Bluetooth 16 Mobile device security in the context of Business Organizations 17 BYOD Trend and security Issues 19 Unknown third-party access via mobile apps 20 Difficult to track data 21 Challenging data management and segregation 21 Devices can be stolen 22 Recommendations 22 Improve Authentication Mechanisms 22 Install and Update firewall in mobile devices 23 Malware Risk Management 23....
wireless technologies have become a part of our routine lives.... remote controllers to the cellular devices, computers and laptops everything is now operated through the integrated wireless technology (Comer, 2008).... wireless Technologies.... wireless technologies have become a part of our routine lives.... remote controllers to the cellular devices, computers and laptops everything is now operated through the integrated wireless technology (Comer, 2008)....
This essay "Bluetooth Application Development" is about a host of technological innovations that have revolutionized wireless broadband Internet access and provided many new and exciting opportunities.... ricsson, Nokia, IBM, and a host of other companies together developed the Bluetooth wireless specification to specifically address the Personal Area Networking needs.... Bluetooth is a short-range, low-cost, small form-factor, and secure wireless solution that promises to completely eliminate the need for all data cables connecting the devices in homes and offices....
In this essay "Complex Testing" will be discussed the major holders, technical teams, and weaknesses in the system can be discussed and sorted out.... One of the primary areas of concern is load management i.... .... increase in website visitors lead to slow response and sometimes making it inaccessible....
In the organization's individuals setting up the network sometimes fail to understand the security requirements.... However, there is substantial variation in the security measures built into these networks.... The paper starts with a brief introduction of wireless fidelity and then discusses issues in wireless fidelity and disadvantages.... Wi-Fi is a wireless technology works like a cell phone and offers fast and effortless connection from anywhere within the range of a base station....
The paper titled 'Mobile and wireless Technology: Trends on the Rise' was an attempt to explain and describe trends on mobile and wireless technology prevalent in today's world, especially with regard to the global business scenario.... It was found that mobile and wireless technology play a vital role in several aspects of the business.... With the advancements in the fields of mobile and wireless technology, the world is becoming a smaller place every day....
Such techniques eventually increase both the technical as well as legal complexities in investigating and prosecuting the cyber crimes.... The author states that cybercrime and its investigation process area necessity in today's time.... National governments need to examine the current status to determine if they are sufficient enough to combat with the kinds of crimes committed through the wired technology....
The paper 'Increasing Use of mobile Technologies and Its Impact on Their Daily Lives' is a delightful example of a research paper on information technology.... The paper 'Increasing Use of mobile Technologies and Its Impact on Their Daily Lives' is a delightful example of a research paper on information technology.... The paper 'Increasing Use of mobile Technologies and Its Impact on Their Daily Lives' is a delightful example of a research paper on information technology....
23 Pages(5750 words)Research Paper
sponsored ads
Save Your Time for More Important Things
Let us write or edit the case study on your topic
"Investigating Mobile Wireless Security"
with a personal 20% discount.