Grin logo
en de es fr
Shop
GRIN Website
Publicación mundial de textos académicos
Go to shop › Ciencia de la Computación - IT-Security

Managing Threats of Cyber-Attacks on Mobile Devices

Título: Managing Threats of Cyber-Attacks on Mobile Devices

Texto Academico , 2017 , 12 Páginas , Calificación: 2

Autor:in: Anthony Kithome (Autor)

Ciencia de la Computación - IT-Security
Extracto de texto & Detalles   Leer eBook
Resumen Extracto de texto Detalles

Evidently, mobile phones and other mobile devices have taken over personal computers. They have become part of personal and business lives amongst the users. Regardless of they have brought unlimited challenges especially on issues of security. Cyber-attacks not only within individuals but also for businesses and government entities have threatened the welfare of mobile phones. Attacks on smartphones are on the high increase and quite sophisticated. This is quite alarming considering the fact that these devices are increasingly used to access and store sensitive personal information. In addition, they have also been used to conduct vital transactions such as in banking and online shopping. Vulnerability of attacks is high especially when attackers target unsuspecting users. Inasmuch as attacks target individuals, companies have also experienced similar threats that in the long run lead to massive losses whether as a result of breach of privacy and the risk of data loss or the resources used to secure the platforms. As a matter of fact, it has been estimated that cyber-attacks in mobile devices is very high as compared to personal computers. Nevertheless, the trend has been severed by ignorance of users who either fail to enable the security settings in their mobile devices or lack the resources to acquire more advanced mobile security. In overall, the industry has experienced laxity in providing up-to-date security technologies to secure mobile devices accordingly.

Extracto


Table of Contents

  • Abstract
  • Introduction
  • Literature review
  • Potential cyber-attack threats on mobile devices
  • How safe are the mobile devices when used for personal or business purposes?
  • How to manage threats of cyber-attacks on mobile device
  • Conclusion
  • References

Objectives and Key Themes

This research paper aims to explore the vulnerabilities of mobile devices to cyber-attacks and offer practical strategies for managing these threats. The study analyzes past research and reports to answer key questions about the potential threats to mobile security, the safety of mobile devices in personal and business contexts, and effective methods for managing cyber-attack risks.

  • The growing threat of cyber-attacks on mobile devices.
  • Security vulnerabilities and risks associated with mobile device usage.
  • Strategies for managing cyber-attack threats on mobile devices.
  • The role of user awareness and security practices in mitigating risks.
  • The importance of updated security technologies and proactive measures.

Chapter Summaries

  • Abstract: The abstract introduces the increasing prevalence of cyber-attacks on mobile devices and highlights the concerns regarding security vulnerabilities and the need for effective countermeasures.
  • Introduction: This section establishes the importance of mobile devices in both personal and business settings and discusses the growing threats posed by cybercriminals. The research questions guiding the study are presented.
  • Literature review: This chapter examines past research findings on mobile security vulnerabilities and the rise of cyber-attacks on mobile devices. It highlights the challenges faced by enterprises in protecting corporate data stored on mobile devices.
  • Potential cyber-attack threats on mobile devices: This chapter delves into specific types of cyber-attacks targeting mobile devices, including examples like the Valentine's Day attack of 2011.

Keywords

This research paper focuses on the key concepts of mobile security, cyber-attacks, vulnerability, threat management, user awareness, and security practices. The study aims to provide insights into the challenges and solutions for protecting mobile devices from malicious activities.

Final del extracto de 12 páginas  - subir

Detalles

Título
Managing Threats of Cyber-Attacks on Mobile Devices
Universidad
Egerton University
Calificación
2
Autor
Anthony Kithome (Autor)
Año de publicación
2017
Páginas
12
No. de catálogo
V421400
ISBN (Ebook)
9783668688827
ISBN (Libro)
9783668688834
Idioma
Inglés
Etiqueta
managing threats cyber-attacks mobile devices
Seguridad del producto
GRIN Publishing Ltd.
Citar trabajo
Anthony Kithome (Autor), 2017, Managing Threats of Cyber-Attacks on Mobile Devices, Múnich, GRIN Verlag, https://www.grin.com/document/421400
Leer eBook
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
Extracto de  12  Páginas
Grin logo
  • Grin.com
  • Page::Footer::PaymentAndShipping
  • Contacto
  • Privacidad
  • Aviso legal
  • Imprint