Friday, October 18, 2019
Mobile Cybersecurity Research Paper Example | Topics and Well Written Essays - 3750 words
Mobile Cybersecurity - Research Paper Example To top that cloud-computing has served as an icing to the cake. There is now a whole new and refined market place for the mobile devices and their data-sharing. There are different kinds of threats that a user of these devices face. Threat of device being actually stolen (physical threat), threats of virus attacks or hijacking of the devices (McGhee).The most basic reason that writers put forward for such mobile security risks is the lack of awareness and ignorance by the general public at large to such great threats or risks. They say that either users are not aware of such risks or either if they do they believe that their devices have enough security features to protect them as evident fromâ⬠¦ Keywords: cyber security, digital devices, wireless networks Introduction While living through the Network Era, we are witnessing the drastic changes that the industry of information and technology is going through. It has become a norm that within short intervals of time period we witne ss something much more innovative and creative. On daily basis human race comes up with a brand new idea which makes the previous ones obsolete. Especially in the techno sector, this change is so fast paced that the slow movers are thrown out within moments. From industrial manufacturing processes to daily lives to computer world, everything is changing. All of this happened just in a couple of decades. We are witnessing things that were previously never thought of or if anyone used to talk about it he or she was considered lunatic. But now with such technological advancements nothing seems to be impossible. From mainframe to mini and mini to personal computers, now even from personal computers to handheld digital devices, we mark the beginning of a new era; the era of mobile and smartphones. It would not be wrong if I say here that the time is not far when even laptops will be replaced by these portable handheld devices. Today, everyone can be seen to own one of those devices. Be i t a business professional, house wives or kids at school or college. These devices have become a part of our daily life and routine. Without them the world does not seem complete or it seems that something is missing. Be it a trend to own them or a necessity or some peer/social pressure or influence, everyone wants to grab one. With the advancements in the field of information and technology and wireless protocols, a whole new world has been opened for researchers and techno lovers. With the advent of third generation and now even fourth generation a whole new realm of opportunities has opened. To top that cloud-computing has served as an icing to the cake. There is now a whole new and refined market place for the mobile devices and their data-sharing. With the mobile market increasing exponentially, we can see the new ways and work practices that individuals and even organizations are adopting. There is an increased use and reliance has been observed by both individuals and the org anizations. This is due to the basic factor that these digital mobile devices or smartphones provide; that is the ease of connectivity and their mobility. It just becomes easier for everyone to collaborate even from the remotest of the places. But with the introduction of such devices for example net books, tablets, smartphones and even now personal music players; there comes another risk, the risk of their security. Today these devices hold
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.