Sign In
Not register? Register Now!
You are here: HomeResearch PaperIT & Computer Science
Pages:
16 pages/≈8800 words
Sources:
18 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:

Mobile Phone Protection IT & Computer Science Research Paper (Research Paper Sample)

Instructions:

The instructions of this parer were that i conduct an expansive research on mobile phone protection. a minimum of 15 pages were required.

source..
Content:


Mobile Phone Protection
Student’s Name
Institutional Affiliations
Mobile Phone Protection
Abstract
This work aims to look into various issues that surround mobile phone protection. The major issues that are looked at include the threats, practices, challenges and legal issues. Under threats, various issues that facilitate insecurity or lack of protection to mobile phones such as bad practice, attacks from hackers, and others are discussed. Practices are the mode if interactions that people engage in with their phones that pose a threat to the protection of their devices. There are also technological factors that bring about issues in the protection of mobile phones. There are challenges that are faced when trying to implement mobole protection such as the fast evolution of technology, which is denying people time to learn how to keep their devices secure, among others. An overview or mobile phone usage worldwide is done, where it is found that above 70 percent of mobile phone users use Android-powered gadgets. More details are provided in this case. Lastly, legal, ethical, and social issues are considered. A personal thought or argument is presented which argue that it is impossible to achieve absolute mobile phone protection.
Table of Contents TOC \o "1-3" \h \z \u Mobile Phone Protection PAGEREF _Toc531713634 \h 2Abstract PAGEREF _Toc531713635 \h 2Introduction PAGEREF _Toc531713636 \h 4Threats to Mobile Phone Protection PAGEREF _Toc531713637 \h 4Application-Based Threats PAGEREF _Toc531713638 \h 4Web-Based Threats PAGEREF _Toc531713639 \h 5Network-Based Threats PAGEREF _Toc531713640 \h 5Physical Threats PAGEREF _Toc531713641 \h 6Attacks on Mobile Security PAGEREF _Toc531713642 \h 7Malware/Worms/Spyware/Trojan Horse/Virus Attacks PAGEREF _Toc531713643 \h 7Bluetooth Attacks PAGEREF _Toc531713644 \h 9Understanding the Risks and Formulating Mitigation Strategies PAGEREF _Toc531713645 \h 9Mobile Security Challenges PAGEREF _Toc531713646 \h 12Resolving Mobile Phone Security Issues PAGEREF _Toc531713647 \h 13Securing Mobile Networks PAGEREF _Toc531713648 \h 13GSM Security PAGEREF _Toc531713649 \h 13Entity Authentication and Key Agreement PAGEREF _Toc531713650 \h 13Message Protection PAGEREF _Toc531713651 \h 15Security in GPRS PAGEREF _Toc531713652 \h 15Systematic Approach to Mobile Phone Security PAGEREF _Toc531713653 \h 15Education PAGEREF _Toc531713654 \h 16Detection PAGEREF _Toc531713655 \h 17Response PAGEREF _Toc531713656 \h 17Understanding PAGEREF _Toc531713657 \h 17Other Security Responsibilities of Mobile Phone Users PAGEREF _Toc531713658 \h 17Legal, Ethical, and Social Issues PAGEREF _Toc531713659 \h 18Global Differences in Legal Concepts PAGEREF _Toc531713660 \h 19Criticism Theory PAGEREF _Toc531713661 \h 19Legal and Ethical Issues in Mobile Banking PAGEREF _Toc531713662 \h 19E-Commerce and Mobile Shopping Legal and Ethical Issues PAGEREF _Toc531713663 \h 20Legal, Ethical, and Social Issues in Use of Phones on Social Media PAGEREF _Toc531713664 \h 21General Ethical Issues PAGEREF _Toc531713665 \h 22Argument/Personal Position PAGEREF _Toc531713666 \h 22Conclusion PAGEREF _Toc531713667 \h 23References PAGEREF _Toc531713668 \h 24
Table of Figures
TOC \h \z \c "Figure" Figure 1: Malware attacks (Jeffrey et al., 2016). PAGEREF _Toc531037577 \h 7
Figure 2: Market trend of usage of Operating Systems on Mobile Phones (Mitchell, 2017). PAGEREF _Toc531037578 \h 9
Figure 3: Smartphone OS Market Share (Mitchell, 2017). PAGEREF _Toc531037579 \h 10
Introduction
Recently, mobile computing has greatly advanced where mobile phones carry a lot of information that is regarded to be of high privacy, confidentiality, and secrecy. Indeed, to most people, of all electronic devices, used, mobile phones handle the tasks that should be considered the most confidential and private. Communication lines require security, information sharing, whether file exchange requires security, and many more computations need privacy protection. Mobile phones threats come from various sources, it is identified that numerous challenges face the protection of mobile data. According to Sujithra (2012), mobile phones protection is faced with various challenges which include poor or inefficient authentication and authorization techniques, insecure data storage, lack of experience in users on how to hand data and what they should access using their mobile phones or not, among other major challenges (Sujithra, 2012). Some users fail to cover up, or rather they disclose their potential information unknowingly, in rare cases, weak cryptographies that are implemented in exchanging messages are broken. Also, in some cases, the transport layer is poorly protected, among other major issues. Also, numerous threats face mobile phone protection, which is put in different categories. These threats may be either physical, network-based, application-based, or web-based. The section below discussed these challenges and threats in a broader and more detailed perspective

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Machine Learning and Clinical Decision Support System Research Paper
    Description: Abstract:-Background: This research aim at finding out the impact of the implementation of machine learning in the development of Clinical Decision Support Systems (CDSSs). The research also seeks to look into various types of algorithms and how they are applied. Method: This research...
    11 pages/≈3025 words| 11 Sources | APA | IT & Computer Science | Research Paper |
  • Computer Investigation Process. IT & Computer Science Research Paper
    Description: Computer investigation is a broad field that deals with the use of forensics to extract information. In modern society, the embrace of computer forensic investigation is on a high notch. ...
    5 pages/≈1375 words| 5 Sources | APA | IT & Computer Science | Research Paper |
  • Capstone Project: Verizon Inc. It & Computer Science Research Paper
    Description: Verizon Communications, Inc. is a top-line telecommunications company in the United States. It boasts of having the largest share in the market at 35%. However, it is almost being overtaken by its primary competitor, AT&T, which currently holds 34% of the market share....
    10 pages/≈2750 words| 14 Sources | APA | IT & Computer Science | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!