close
test_template

Mobile Security

download print

About this sample

About this sample

close

Words: 641 |

Page: 1|

4 min read

Published: Dec 18, 2018

Words: 641|Page: 1|4 min read

Published: Dec 18, 2018

Table of contents

  1. Literature Review
  2. Literature Summary Review
  3. Future Research
    File permission
  4. Conclusion

Literature Review

Mobile security, or more specifically mobile device security, has become increasingly important in mobile computing. Of particular concern is the security of personal and business information now stored on smartphones. More and more users and businesses use smartphones to communicate, but also to plan and organize their users” work and also private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company. All smartphones, as computers, are preferred targets of attacks. These attacks exploit weaknesses inherent in smartphones that can come from the communication mode—like Short Message Service (SMS, aka text messaging), Multimedia Messaging Service ) (wifi, Bluetooth and GSM), the global standard for mobile communications.

'Why Violent Video Games Shouldn't Be Banned'?

There are also exploits that target software vulnerabilities in the browser or operating system. And some malicious software relies on the weak knowledge of an average user. According to a finding by McAfee in 2008, 11.6% users had heard of someone else being affected by mobile malware, but only 2.1% had personal experience on such problem. However, this number is expected to grow Security countermeasures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end users.

Literature Summary Review

Mobile devices often do not have passwords enabled. Mobile devices often lack passwords to authenticate users and control access to data stored on the devices. Many devices have the technical capability to support passwords, personal identification numbers (PIN), or pattern screen locks for authentication. Some mobile devices also include a biometric reader to scan a fingerprint for authentication. However, anecdotal information indicates that consumers seldom employ these mechanisms. Additionally, if users do use a password or PIN they often choose passwords or PINs that can be easily determined or bypassed, such as 1234 or 0000. Without passwords or PINs to lock the device, there is increased risk that stolen or lost phones” information could be accessed by unauthorized users who could view sensitive information and misuse mobile devices.

Future Research

    1. Security in operating systems

The first layer of security in a smartphone is the operating system (OS). Beyond needing to handle the usual roles of an operating system (e.g. resource management, scheduling processes) on the device, it must also establish the protocols for introducing external applications and data without introducing risk.

File permission

From the legacy linux, there are also file system permission mechanisms, they help with sandboxing; a process cannot edit any file it wants. It is therefore not possible to change the permissions of files installed on the SD card from the phone and consequently it is impossible to install applications

    1. Security software

Above the operating system security, there is a layer of security software. This layer is composed of individual components to strengthen various vulnerabilities: prevent malware, intrusions, the identification of a user as a human, and user authentication Anti virus and Firewalll An antivirus software can be deployed on a device to verify that it is not affected by a know threat usually by signature detection software that detects malicious executable file. A firewall, main while can also watch over the existing traffick on the network and ensure that a malicious application does not seek to communicate through it.

Get a custom paper now from our expert writers.

Conclusion

Furthermore, it can be noted that it is common to find that updates exist, or can be developed, but this is not always done. One can, for example, find a user who does not know that there is a newer version of the operating system compatible with the smartphone, or a user may discover known vulnerabilities that are not corrected until the end of a long development cycle, which will allows time to exploit the loopholes.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

Mobile Security. (2018, December 17). GradesFixer. Retrieved March 28, 2024, from https://gradesfixer.com/free-essay-examples/mobile-security/
“Mobile Security.” GradesFixer, 17 Dec. 2018, gradesfixer.com/free-essay-examples/mobile-security/
Mobile Security. [online]. Available at: <https://gradesfixer.com/free-essay-examples/mobile-security/> [Accessed 28 Mar. 2024].
Mobile Security [Internet]. GradesFixer. 2018 Dec 17 [cited 2024 Mar 28]. Available from: https://gradesfixer.com/free-essay-examples/mobile-security/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now