StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Impact of Mobile Devices on Cyber Security - Essay Example

Cite this document
Summary
The author of this essay "The Impact of Mobile Devices on Cyber Security" investigates the issues of cybersecurity. Admittedly, cybercriminals have adopted modern technology in their operations to keep at par with the rapidly changing technology in the business world…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
The Impact of Mobile Devices on Cyber Security
Read Text Preview

Extract of sample "The Impact of Mobile Devices on Cyber Security"

The Impact of Mobile Devices on Cyber Security Introduction Cyber criminals have increasingly become organized, professional and profit-oriented. They have adopted modern technology in their operations to keep at par with the rapidly changing technology in the business world. Whereas considerable gains have been made with regards to cyber security, the invention of new technological gadgets threatens to reverse such gains. One such technology, mobile devices, has been used to access sensitive data like credit reports and transact businesses. However, even with the increased popularity and functionality of these mobile devices, Metzler (2011) observes that the devices have been an attraction for more cybercriminals. Indeed, mobile devices make I difficult to develop and enforce effective cyber security as they make it more complex to fight cyber attacks and make information targeted by cybercriminals more available and accessible. Cyber security has faced critical challenges, especially so after the invention of the Internet, which interconnected various computing devices. Cyber attack has been defined by Kostopoulos (2013) as the action intended to undermine computer or electronic communications network functioning. Baumhof (2012) observes that in 2011, 25 million unique malware strains were developed with the number expected to hit 87 million by the end of the year 2015. Thus, important measures have to be undertaken to boost cyber security. Cyber security refers to the protection of computers, programs, data and networks from unauthorized or unintended access, destruction or alteration. Nonetheless, the influx of mobile devices does not support this objective. Mobile devices are portable and wireless computing devices. Their popularity has been boosted by their ability to access the Internet. This is the foundational reason for the negative impact of the devices on cyber security. The first impact of mobile devices is the making of cyber security a complex venture with regards to the development and enforcement of effective strategies. These devices are brought into and out of workplaces regularly with managers finding it hard to impose restrictions on their use. In fact, a majority of modern day employees prefer working from their personal mobile devices, a trend referred to as “bring your own device” or BYOD by Drew (2012, 44). This model allows such employees to connect to their corporation’s networks. Despite this having a myriad of benefits, the lack of control over these devices used for work poses serious cyber security threat. According to Metzler, management of such devices owned by employees is complex “because it is much more difficult to maintain standardization… and to install software and agents designed to lock them down” (2011, 12). In fact, their small sizes could make them unnoticed, giving attackers the opportunity to execute their intentions. This could be the reason that caused the US Department of Defense not to notice the 14,000 handsets used without appropriate authorization in the military (Electronics Recyclers International, 2013). If the military faces such challenges with mobile devices, the private sector faces an even greater challenge. Mobile applications, also known as apps, have been used to access and record personal information fed and stored in these mobile devices such as passwords and personal identification numbers, PINs which are relayed to cybercriminals (Khajuria & Andersen, 2012). Once these devices have been used to transfer data, lost or stolen, such data would not be remotely erased. Thus, mobile devices have made it complex to develop and enforce effective cyber security strategies. Secondly, mobile devices have made it possible for cyber attackers to access a greater target hence making cyber security cumbersome. It is a fact that mobile devices have been widely used than personal computers. In fact, such devices with greater computing abilities and Internet accessibility have sold more. In 2012, the tablets sales, for instance, grew by 120% from the previous year to reach 17.4 million units globally. The global sales of smartphones hit 144.4 million in the first quarter of the same year, revealing a trend of 45% increase in sales over years (Drew, 2012). By 2017, Khajuria and Andersen (2012) postulate that 80% of Americans would be using smartphones. The number of smartphones being shipped globally exceeds the number of phones with basic functionalities and unable to access the Internet. With such trends and numbers, more people are postulated to acquire mobile devices. With each acquisition, cyber attackers have their potential target widened, hence jeopardizing the gains made in cyber security over the past years. Finally, mobile devices have increased the accessibility of personal information and other sensitive corporate information. Mobile devices have computing abilities and have been used to store a myriad of personal information. This not only includes the information about the holder of the device but also of other people as stored by the device user (Baumhof, 2012). Because of the richness of these devices with information useful to cyber attackers, there have been various strategies developed to access such information. The development of malicious applications (malware) has been common with the aim of attacking these devices and accessing them. Additionally, their smallness in size makes them easy to lose. They are also easily forgotten. This combination of factors presents attackers with opportunities to access unauthorized information. Mobile devices also access information through wireless networks such as Wi-Fi. Thus, attackers are able to intercept the shared information for unauthorized use (Sujithra & Padmavathi, 2012). As documented by Drew (2012), executive and all employees adopting the BYOD model of operation could download confidential client or personally identifying information to their tablets or smartphones. If such devices get compromised, stolen or lost, the critical information contained therein could be found by cyber attackers. This risk is further propagated by users’ ignorance to install and update antivirus protection on their devices as contrasted to when using personal computers. Even the basic security measure of password protection would rarely be observed on mobile devices as opposed to the case with personal computers. This therefore makes mobile devices propagate cyber attack threats. Conclusion The invention of mobile devices was a beneficial move in making it simpler for humans to carry out their daily activities. There has been an influx of these devices, particularly the ones with greater computing capabilities and ability to connect to the Internet. However, it is such capability that has made it complex to develop and reinforce cyber security strategies. It has generated a greater target pool for cyber attacks. Furthermore, it has made personal and confidential information more accessible. This has presented cybercriminals with an opportunity to execute their malicious intents, making the realization of cyber security elusive. References Baumhof, A. (2012, July 23). The creeping risk of mobile and personal devices in insurance. Insurance Advocate, 32 – 35. Retrieved 8 May 2014 from http://eds.b.ebscohost.com.ezproxy.umuc.edu Drew, J. (2012). Managing cybersecurity risks: Mobile and cloud open doors to opportunities and threats. Journal of Accountancy, 214 (2), 44 – 48. Retrieved 8 May 2014 from http://eds.b.ebscohost.com.ezproxy.umuc.edu Electornic Recyclers International. (2013, April 4). Electronic Recyclers International CEO warns that Army’s mobile security concerns are ‘small tip of massive iceberg.’ Regional Business News. Retrieved 8 May 2014 from http://eds.b.ebscohost.com.ezproxy.umuc.edu/ Khajuria, S. & Andersen, B. (2012). Authenticated encryption for low-power reconfigurable wireless devices. Journal of Cyber Security and Mobility, 1, 189 – 203. Kostopoulos, G. (2013). Cyberspace and cybsersecurity. Boca Raton, FL: CRC Press. Metzler, J. (2011, November 7). Are you ready for networking in the cloud? Trend Analysis, p. 11 – 12. Retrieved 8 May 2014 from http://eds.b.ebscohost.com.ezproxy.umuc.edu Sujithra, M. & Padmavathi, G. (2012). Mobile device security: A survey on mobile device threats, vulnerabilities and their defensive mechanism. International Journal of Computer Applications, 56 (14), 24 – 29. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Impact of Mobile Devices on Cyber Security Essay”, n.d.)
Retrieved from https://studentshare.org/technology/1645140-the-impact-of-mobile-devices-on-cyber-security
(The Impact of Mobile Devices on Cyber Security Essay)
https://studentshare.org/technology/1645140-the-impact-of-mobile-devices-on-cyber-security.
“The Impact of Mobile Devices on Cyber Security Essay”, n.d. https://studentshare.org/technology/1645140-the-impact-of-mobile-devices-on-cyber-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Impact of Mobile Devices on Cyber Security

Analyze the impact of technology on a field of study of your choice

The Impact of Mobile Devices on Cyber Security The Impact of Mobile Devices on Cyber Security The widespread popularity of mobile devices such as Smartphones, tablets, iPhones, and iPads has made modern life more convenient and productive.... Although these devices have become an integral part of the modern life, they raise certain potential challenges to the cyber security.... Despite numerous advantages including high productivity and greater convenience, mobile devices raise severe threats to cyber security....
5 Pages (1250 words) Essay

Statistics on Internet Use among Young People

hellip; The respondents had faced a problem in internet security while in the process of using the internet at different times, most of the people in the 40% had experienced some form of insecurity frequently, 40% had received some form of internet insecurity while only 20% of the total respondents had received any form of insecurity.... Through this analysis, it implied that users of the internet had a lot of time to spend on the internet per day which may have an impact on their performance in their duties....
8 Pages (2000 words) Essay

Malware and Their Current Impact on Private and Public Affairs

This article is being carried out in order to clarify the purpose and impact of malware, most especially the current forms of malware which has infiltrated the computer world.... The paper "Malware and Their Current Impact on Private and Public Affairs" discusses that in order to reduce the risks attached to malware diffusion, it is important to raise the level of awareness for such malware, mostly for sectors which are involved in mobile communications and social networking....
8 Pages (2000 words) Coursework

The Dangers of Cyber-Terrorism

In the paper “The Dangers of cyber-Terrorism” the author discusses cyber terrorism, which entails two major aspects: cyberspace and terrorism, allowing it to be considered as the usage of information technology by terrorist organizations.... The risk of cyber terrorism is extremely genuine and incredibly hazardous.... The intelligence strategies, safety strategies, and devices which are designed to shield us, now are immobilized against this latest disastrous tactic, known as cyber terrorism....
5 Pages (1250 words) Research Paper

Latest Cybercrimes According to Cyber Security Bloggers

One of the latest cybercrimes according to cyber security bloggers involves hacking of beauty supply chain Sally Beauty (SBH).... Such technological changes include advancement in hardware and software production such as operations between PDAs and WIFI networks, increase in the number of mobile telephones having web surfing capabilities as well as new display technologies (Regalado 1).... impact of new and emerging technologies on IT and its applications are currently evident....
1 Pages (250 words) Essay

Defining of Cyberbullying

The common use of mobiles or other communication devices to send and post text or images that are intended to hurt other people is also cyberbullying.... Such messages may contain viruses that automatically infect your mobile device when opened.... From the paper "Defining of Cyberbullying" it is clear that if any compromising information comes out, one is supposed to report them immediately for proper measures to be taken before it becomes destructive to them....
5 Pages (1250 words) Essay

The Impact of Mobile Devices on Cyber-security

"the impact of mobile devices on cyber-security" paper argues that mobile devices such as smartphones are the most abused by hackers, thus, they need not to be used in storing organizations' information.... In connection to this, the paper will expound on the impact of mobile devices on cyber-security.... By 2013, over 80% of the people in the whole world were using mobile phones and currently, the number of mobile devices in the world exceeds 6 billion....
5 Pages (1250 words) Coursework

Designing Manufacturing Constraint in Mobile Phone

However, on mobile devices, the challenges related to performance issues are quite a bit bigger, because the runtime platforms may be limited in their functionality, the platforms are inherently limited in their resources (mostly processing power and memory), and the devices often have connectivity that may be substantially slower than best-case scenarios, or may even be intermittent.... The report file by Central Intelligent agency 2005 indicates the usage of mobile phones across the globe increasingly high....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us