StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

SmartPhone Security - Essay Example

Cite this document
Summary
With the passage of time, there is explosive development in wireless computing, both in the organizations and at home, and this presents totally different security problems. The security problem of Wireless networks is different in homes as compare to organizations. In the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
SmartPhone Security
Read Text Preview

Extract of sample "SmartPhone Security"

Download file to see previous pages

Hackers, who know the default setting, can gain access to wireless network. In this way the network fails to require identification and verification of all users. This paper deals with the security issues in Smart phone. We will start our discussion with a brief introduction of Smart phone. Smart phones, as name implies that it is small device. It is small device but it has more functionality of mobile phone and computer. It use used for communication like mobile phone and computing functionality like computer.

With the help of smart phone, a user can interact with different application at same time. It is so small you can put in your pocket. You can install more software in your smart phones (Kenneth, 1996). Smart phones combine the functions of pagers, cellular telephones, and personal digital assistants into a small single device. A smart phone is a wireless phone with text and Internet capabilities. It can handle wireless telephone calls, voice mail, email, and faxes, save addresses, and access information from Internet.

Wireless networks can be more expensive, slower, and more error prone than wired networks. Bandwidth and energy supply in wireless devices require careful management from both hardware and software standpoints (Imielinski and Badrinath, 1994). Security and privacy will be more difficult to maintain because wireless transmission can be easily intercepted. Data cannot be transmitted seamlessly between different wireless networks if they use incompatible standards. The entire point of computer security is to eliminate or protect against threats.

A threat is anything that can cause harm. A threat can be simple error, burglar or virus. A threat is not harm full unless it exploits an existing vulnerability. Vulnerability is a weakness, any thing that has not been protected against threats. Threats to your smart phone hardware involve incidents that have effect on the operation or maintenance of the smart phone. The smart phones are using

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“SmartPhone Security Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1546158-smartphone-security
(SmartPhone Security Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/miscellaneous/1546158-smartphone-security.
“SmartPhone Security Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1546158-smartphone-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF SmartPhone Security

Email Leaks investigation

Websense, 2012, Performing Exchange Discovery, viewed October 14, 2012, Dilanian, Ken, 2012, Los Angeles Times, SmartPhone Security gap exposes location, texts, email, expert says, viewed October 14, 2012, ... Additional security for the PC's is provided by the use of smart card technology.... Knowing that the vast majority of security leaks are internal I asked the VP point blank if there could possibly be anybody inside the company that could possibly have his credentials, such as a secretary or trusted assistant....
3 Pages (750 words) Essay

Mobile Security Issues

This paper ''Mobile security Issues'' has presented a detailed analysis of mobile security issues.... This paper has discussed a number of security issues from different perspectives.... hellip; Computing Capabilities 16 Internet Access 16 Bluetooth 16 Mobile device security in the context of Business Organizations 17 BYOD Trend and security Issues 19 Unknown third-party access via mobile apps 20 Difficult to track data 21 Challenging data management and segregation 21 Devices can be stolen 22 Recommendations 22 Improve Authentication Mechanisms 22 Install and Update firewall in mobile devices 23 Malware Risk Management 23....
26 Pages (6500 words) Research Proposal

Recent Malware Attack and Stuxnex Virus

For security reasons, computers for monitoring and controlling the operation of the plant were not connected to the internet.... This case study "Recent Malware Attack and Stuxnex Virus" describes features of Stuxnet Virus, the way of malware originated, propagated, statistical evidence on the prevalence of the malware, aspects of those malware attacks....
7 Pages (1750 words) Case Study

Personal statement for PHD admission

Yet, beyond working for Professor Chien, I have also performed a copious amount of work with respect to hardware inventory tracking for Android applications in use by Cummins as well as SmartPhone Security applications while at IUPUI in Indianapolis, Indiana.... from Purdue is predicated on several factors; factors that this particular statement of interest will detail....
2 Pages (500 words) Essay

Smartphones and the Security of the Data in Them

The paper "Smartphones and the security of the Data in Them" discusses information regarding ways of securing and protecting your smartphones, both physically and its data.... hellip; With the information gathered regarding multiple security threats that are currently present and looming today, we can say that there is a significant issue regarding smartphones and the security of the data.... Personal computers can be hacked or could get viruses and spyware, while networks are the target of security breaches, and of course, smartphones can be attacked as well....
7 Pages (1750 words) Term Paper

The Impact of Smart Phones on Our Lives

The researcher states that smartphone operating systems have branched out and have become the primary interface by which one can reach out to the internet and has blurred the lines between the computers and other things.... The smartphone market is anticipated to continue its fast development in the next five years and, as a result, is ever-increasing in complexity....
21 Pages (5250 words) Research Paper

The Use of Technology in University Classrooms to Extent Are Smartphones and Tablets

The paper "The Use of Technology in University Classrooms to Extent Are Smartphones and Tablets" discusses that teachers can monitor the academic progress of students in class through information stored in tablets.... This information gives details regarding grades, term assignments.... hellip; It is essential to state that smartphones and tablets have brought drastic changes in education....
9 Pages (2250 words) Research Proposal

End Point Protection Comparison

Symantec's Norton products include Norton 360, Norton Antivirus, Norton Internet Security, Norton SystemWorks, Norton Save and Restore, Norton Ghost, Norton SmartPhone Security, Norton Online Backup among other products.... This report "End Point Protection Comparison" presents the choice of endpoint security solution that depends on the needs of an organization.... Likewise, the ease of use and integration with other security features is a determinant in acquiring an endpoint security solution....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us