Grin logo
de en es fr
Shop
GRIN Website
Publicación mundial de textos académicos
Go to shop › Ciencia de la Computación - IT-Security

Managing Threats of Cyber-Attacks on Mobile Devices

Título: Managing Threats of Cyber-Attacks on Mobile Devices

Texto Academico , 2017 , 12 Páginas , Calificación: 2

Autor:in: Anthony Kithome (Autor)

Ciencia de la Computación - IT-Security
Extracto de texto & Detalles   Leer eBook
Resumen Extracto de texto Detalles

Evidently, mobile phones and other mobile devices have taken over personal computers. They have become part of personal and business lives amongst the users. Regardless of they have brought unlimited challenges especially on issues of security. Cyber-attacks not only within individuals but also for businesses and government entities have threatened the welfare of mobile phones. Attacks on smartphones are on the high increase and quite sophisticated. This is quite alarming considering the fact that these devices are increasingly used to access and store sensitive personal information. In addition, they have also been used to conduct vital transactions such as in banking and online shopping. Vulnerability of attacks is high especially when attackers target unsuspecting users. Inasmuch as attacks target individuals, companies have also experienced similar threats that in the long run lead to massive losses whether as a result of breach of privacy and the risk of data loss or the resources used to secure the platforms. As a matter of fact, it has been estimated that cyber-attacks in mobile devices is very high as compared to personal computers. Nevertheless, the trend has been severed by ignorance of users who either fail to enable the security settings in their mobile devices or lack the resources to acquire more advanced mobile security. In overall, the industry has experienced laxity in providing up-to-date security technologies to secure mobile devices accordingly.

Extracto


Table of Contents

1. Abstract

2. Introduction

3. Literature review

4. Potential cyber-attack threats on mobile devices

5. How safe are the mobile devices when used for personal or business purposes?

6. How to manage threats of cyber-attacks on mobile device

7. Conclusion

Objectives and Topics

This research paper explores the evolving landscape of cyber threats targeting mobile devices, examining the risks associated with personal and business usage. It aims to identify the vulnerabilities inherent in mobile technology and evaluates effective management strategies to mitigate security breaches and protect sensitive user data.

  • Evolution of mobile devices from simple phones to powerful, vulnerable computing platforms.
  • Analysis of common security threats, including malware, viruses, and unauthorized remote access.
  • Assessment of security risks in both personal and organizational environments.
  • Evaluation of preventive measures such as cloud storage, security settings, and anti-virus applications.
  • The role of user behavior and awareness in maintaining mobile device security.

Excerpt from the Book

Potential cyber-attack threats on mobile devices

Although it has been said that mobile devices, like computers, pose a great threat to security in various parts of the world, the truth is that it is the people, and not the mobile devices, that is creating the threats. In most cases, it is humans using computers to victimize other mobile devices and mobile device users for their own good. Given space on the internet, computer hackers will increase the security threats exponentially. While there might be many definitions of hacking, hackers are generally considered to be individuals who use unauthorized means to break into computers and computer systems in order to destroy, change or steal information (Shaulov, 2016). In order to achieve their purposes, hackers will often install dangerous malware without the consent or knowledge of the mobile devices users. In order to achieve their objectives, hackers must be clever in their detail and tactics and must have excellent computer knowledge in order to access the information they want. Irrespective of the definition, hacking is considered to be a crime in many parts of the world. Hackers expose unsuspecting individuals to loss of personal information and economic inconvenience while also making it hard for the law enforcement agency to arrest and prosecute cyber criminals.

While most mobile devices users feel that they might be free from hackers, the reality is that any mobile devices users can be victims of hackers. Although the majority of hacking occurs online, where computer networks are used to facilitate the crime, even offline computer users are not safe. Indeed, most of the hacking takes place offline when the hackers use software to gain access to mobile devices and computer systems to gain access to various types of information, including the logging details and other personal information about the users (Shaulov, 2016). Once this personal information is acquired, the owner of such information is left at the mercy of the hackers. In most cases, the stolen information is used for the purposes of identity theft.

Summary of Chapters

Abstract: Provides an overview of the rise in mobile device usage and the corresponding increase in sophisticated cyber-attacks that threaten sensitive personal and business information.

Introduction: Outlines the transformation of mobile devices into powerful computers and defines the qualitative research approach used to investigate mobile security threats.

Literature review: Examines existing studies on the popularity of smartphones, the laxity of corporate security enforcement, and the history of mobile vulnerabilities.

Potential cyber-attack threats on mobile devices: Discusses the human element behind security threats, defining hacking and detailing how malware and viruses are used to exploit unsuspecting users.

How safe are the mobile devices when used for personal or business purposes?: Compares the risk profiles of personal and organizational mobile usage, highlighting common dangers like viruses, identity theft, and accidental data loss.

How to manage threats of cyber-attacks on mobile device: Suggests practical mitigation strategies, including the use of cloud storage, disabling unused connectivity features, and installing anti-virus software.

Conclusion: Summarizes the necessity of proactive security measures, emphasizing the importance of internet caution, file backups, and secure cloud management to ensure data safety.

Keywords

Mobile Security, Cyber-attacks, Smartphones, Hacking, Malware, Viruses, Identity Theft, Data Protection, Cloud Storage, Anti-virus, Mobile Devices, Network Security, Personal Privacy, Corporate Data, Cybersecurity.

Frequently Asked Questions

What is the primary focus of this research paper?

The paper focuses on the growing security challenges and cyber-attack threats facing mobile devices, which have become integral to both personal and professional life.

What are the central thematic fields covered in the text?

The central themes include the evolution of mobile technology, the nature of mobile-specific cyber threats, differences between personal and business security risks, and management strategies for mobile protection.

What is the core research objective of this work?

The primary objective is to analyze potential threats to mobile devices, determine the current safety levels of these devices during usage, and provide recommendations on how to manage these security risks.

Which scientific methodology is employed in this study?

The paper adopts a qualitative research approach, specifically utilizing a content analysis of existing literature and study reports to draw valid conclusions.

What topics are discussed in the main body of the paper?

The main body covers the prevalence of hacking, the sophistication of modern mobile malware, the specific risks of identity theft, and practical defensive techniques for users.

Which keywords best characterize this work?

Keywords include Mobile Security, Cyber-attacks, Hacking, Malware, Data Protection, Cloud Storage, and Smartphone Vulnerabilities.

How does the author characterize the role of the user in mobile security?

The author emphasizes that users are often the weakest link in the security chain, frequently disregarding security settings or lacking the knowledge to distinguish between trusted and untrusted applications.

Why is cloud storage highlighted as a management strategy?

Cloud storage is highlighted because it allows users to back up sensitive data and provides remote functionality to delete information if a device is lost or compromised.

What distinction does the paper make regarding corporate versus personal security?

The paper notes that while personal devices are less likely to be connected to organizational networks, they often store highly sensitive information and require similar security vigilance to prevent identity theft.

Final del extracto de 12 páginas  - subir

Detalles

Título
Managing Threats of Cyber-Attacks on Mobile Devices
Universidad
Egerton University
Calificación
2
Autor
Anthony Kithome (Autor)
Año de publicación
2017
Páginas
12
No. de catálogo
V421400
ISBN (Ebook)
9783668688827
ISBN (Libro)
9783668688834
Idioma
Inglés
Etiqueta
managing threats cyber-attacks mobile devices
Seguridad del producto
GRIN Publishing Ltd.
Citar trabajo
Anthony Kithome (Autor), 2017, Managing Threats of Cyber-Attacks on Mobile Devices, Múnich, GRIN Verlag, https://www.grin.com/document/421400
Leer eBook
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
Extracto de  12  Páginas
Grin logo
  • Grin.com
  • Envío
  • Contacto
  • Privacidad
  • Aviso legal
  • Imprint