Assignment Absolutely No Plagiarism

**** Absolutely no plagiarism ***** 

Topic : Mobile users and data security

1. A one full page single spaced paper discussing your topic.

2. A five source annotated bibliography. The sources should be high quality academic references (not techopedia or the like). The annotations for each source should include two paragraphs. The first paragraph should summarize the article and the second should be your reflections on it. Each paragraph must contain at least five sentences.

3. A  PPT on Mobile users and data security with a minimum of 12 slides not including the title and references.

The abstract that we have submitted before: (Dont copy form the below)

Over the last years, technological advancement has continued to rise to create a significant change in the communication landscape. In the contemporary world, many people are linking up through the use of mobile devices by making calls, video calls and sending short messages. The estimate of mobile users in the world is about 5 billion people. Technological advancement has made the use of mobile phones to be smarter by incorporating both video and graphical materials. Improvement in technology is a result of continual research in the field. 

 Unlike the 1970s devices, the current mobile devices have a wide variety of features that have enabled various functions. The past was characterized by limited and costly mobile phones but the current users have increased greatly. For instance, an individual can have as many phones as he or she desires depending on the phone features and specifications. The landscape is moving all the time with new smartphones hitting the market and new features being rolled out almost weekly,” (Curran, Maynes, & Harkin, 2015). Apart from voice communication, one can use a mobile phone to send and receive emails. Due to the change in technology that has led to an increase in mobile users, security threats have been on the rise. This situation calls for security actions from information technology departments. In 2004, the first computer virus that destroyed mobile devices emerged. Since then, many security vulnerabilities followed as more smartphones emerged.

 Mobile security is paramount not only to organizations but also the mobile phone users. It refers to taking initiative strategies to safeguard sensitive data that are kept in mobile devices or any other portal devices. It also involves the capability to protect the enterprise network from being manipulated by unauthorized users. Devices that are prone to mobile security threats are not only smartphones but also portal devices such as wearables, tablets and laptops. Hackers and cyber-criminals are now focusing much of their efforts on mobile platforms, often as a first step to breaking into corporate networks,” (Shaulov, 2016). Potential threats on mobile devices include unsecured WIFI networks, leakage of data, malicious apps and spyware. There are also physical threats such as losing a mobile device or getting stolen. Mobile security can be enhanced through software security, educating mobile users and having internal policies in organizations. 

 Furthermore, sharing of information on the internet or social media platforms poses a risk to information sabotage. It is essential to protect data and maintain data authenticity by ensuring that information is directed to the right recipient. “Considering the importance of personal privacy, people mainly only shares their information with friends and acquaintances,” (Chen & Li, 2017). Lack of data protection makes the user vulnerable to security threats. However, security threats can be managed by viewing information as always vulnerable and taking precautions to ensure that data protection is implemented. For instance, organizations and individuals that deal with critical information should prevent data loss by using backups. 

 Data hacking is another key security to mobile users. This malicious activity is carried out by hackers by getting access to a system and corrupt files as well as manipulating the existing data. Essential information can be lost through this activity or the files can be made to malfunction through virus infections. Thus mobile users need to exercise mobile security by updating anti-viruses to protect their devices. Other mobile security measures also include avoiding the undesired installation of a firewall and using strong passwords.

References

Chen, H., & Li, W. (2017). Mobile device users’ privacy security assurance behavior. Information and Computer Security, 25(3), 330–344. https://doi.org/10.1108/ics-04-2016-0027

Curran, K., Maynes, V., & Harkin, D. (2015). Mobile device security. International Journal of Information and Computer Security, 7(1), 1. https://doi.org/10.1504/ijics.2015.069205

Shaulov, M. (2016). Bridging mobile security gaps. Network Security, 2016(1), 5–8. https://doi.org/10.1016/s1353-4858(16)30006-x

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer