Sample Paper on Issues and Concerns about Security and Mobile Devices

Issues and Concerns about Security and Mobile Devices

Mobile phones experience a range of risks that take advantage of several weak points generally found in such devices. Inadequate technological management can cause these weaknesses, but they can also come from the poor protection methods of customers. Private organizations and relevant federal agencies have taken steps to improve the protection of cellular gadgets, such as creating certain management available for customers to use if they wish and promulgating details about suggested cellular protection methods. However, protection management is not always consistently implemented on mobile phones. This paper takes to investigate several weaknesses that are common to all cellular platforms (Speed et al. 6).

Often, mobile gadgets lack protection passwords. In addition, they often lack protection passwords to verify customers and control the access of information stored on the gadgets. Some gadgets also include a biometric reader to scan finger marks for verification. However, historical details indicate that clients employ these mechanisms. Additionally, if customers use a password or PIN, they often choose protection passwords or PINs that can be easily determined or sidestepped, such as 1234 or 0000. Without protection passwords or PINs to lock the product, there is an improved threat that illegal customers who could view delicate details and neglect cellular gadgets could access lost or stolen phones’ details (Hu, Chung-Wei Lee& Weidong 9).

Two-factor verification is not always used when performing delicate dealings on mobile phones. Studies show that customers usually use fixed protection passwords instead of two-factor verification when performing online delicate dealings while using mobiles. Two-factor verification usually provides an advanced stage of protection than conventional protection passwords and PINs, and this advanced stage may be important for delicate dealings. Two-factor refers to a verification system in which customers are required to verify using at least two different factors. In various two-factor verification schemes, mobile phones are normally utilized as a second aspect. The device can generate pass requirements, or the requirements can be sent through a message on the garget. The absence of two-factor verification improves the existing threat, that illegal customer could access delicate details and abuse the mobiles (Robinson, Harald & Waleed 3).

Wireless signals are not safe. Data like an e-mail sent using a cell phone is never safe while in transit. Moreover, many programs do not secure the information they transmit and receive over the network, creating it is easy for the information to be intercepted. Moreover, mobile phones may contain viruses. Consumers may obtain programs that contain viruses. Consumers obtain viruses unintentionally because it can be disguised as a game, utility, protection patch, or other useful programs. It is challenging for customers to differentiate between a non-virus program and one containing viruses (Speed et al. 16).

Mobile gadgets often do not use protection programs. Customers do not always install protection programs, because these gadgets often do not come pre-installed with such programs. While such program may slow operations and affect battery on some gadgets, without it, the threat that an enemy could successfully distribute viruses such as Trojan viruses, malware, and junk to lure customers into revealing protection passwords or other private details is high.

Cell phones software is out fashioned. Security patches for third-party programs are not always developed and released on a regular basis. Moreover, mobile third-parties programs, such as web internet explorer, do not always notify customers when updates are available. Unlike conventional web internet explorers, mobile internet explorers rarely get up-dates. Using outdated programs increases the threat that an enemy may exploit weaknesses associated with these gadgets (Hu, Chung-Wei Lee & Weidong 11).

Finally, Cellular gargets may have illegal variations. The procedure of changing a cell phone to remove its restrictions, so that customers can add features, changes how protection for the product is handled increases increase protection threats. Jailbreaking permits customers to access a system set up of illegal application functions and programs. While some customers may jailbreak their cellular phones specifically to set up protection improvements such as firewalls, others may simply be looking for a less expensive or easier way to set up suitable programs. In the latter case, customers face increased protection threats, because they are skipping the application vetting procedure established by the maker, thus having less protection against unintentionally setting up viruses. Further, jail-damaged devices may not receive notices of protection updates from the maker and may require extra effort from the user to maintain up-to-date applications (Robinson, Harald & Waleed 13).

Works Cited

Hu, Wen C, Chung-Wei Lee, and Weidong Kou. Advances in Security and Payment Methods for Mobile Commerce. Hershey, Pa: Idea Group, 2004. Web.

Robinson, Philip, Harald Vogt, and Waleed Wagealla. Privacy, Security and Trust Within the Context of Pervasive Computing. Boston, MA: Springer Science+Business Media, Inc, 2005. Web.

Speed, Timothy, Darla Nykamp, Joseph Anderson, and Jaya Nampalli. Mobile Security: How to Secure, Privatize and Recover Your Devices. Birmingham: Packt Publishing, 2013. Web.