Reference no: EM131440935
As the number of smartphone and tablet devices increases, so does the risk that hackers and computer criminals will target these devices. Since they were first introduced, certain mobile devices have been vulnerable to eavesdropping and fraudulent charges. In addition, many of them automatically track a user’s location.27 The major security risks associated with mobile devices include:28 Malware—Android apps, in particular, are vulnerable to malware because of the platform’s openness. To guard against malware threats, users have to upload the most recent versions of the operating system and use mobile security tools. Premium SMS billing—With their devices’ vulnerability to malware, smartphone users face an added risk of subscribing to premium text-messaging services that charge every time users interact with them. Most cell phone carriers allow subscribers to block premium SMS messaging, however. E-mail and SMS phishing—Because it is more difficult to establish a link’s legitimacy on a mobile device, mobile users are more likely to click on them, which is a
phisher’s dream come true. Mobile users should therefore use a lot of caution when using e-mail on these devices. Spyware—Commercially available software can be used by intruders to track and control the user’s mobile activities. Malicious Web sites— These could pose a threat in the future, given that many smartphone browsers are based on a browser engine with vulnerabilities. Many of the recommendations discussed in Chapters 4 and 5 apply here. Never leave your mobile device unlocked. Never leave it unattended. Always protect it with a password.
Answer the following questions:
1. What are some examples of security risks associated with a mobile device?
2. How can these devices automatically track a user’s location?
3. What are a couple of recommendations for protecting your mobile device against these threats?
What is the total cost of training
: A 100 employee information technology department of a financial services company had a high turnover rate (23% per year). A survey of employees revealed that the reason that most of the employees left was dissatisfaction with the level of training. W..
|
When using the net present value method
: How does the cost of capital serve as a screening tool when using the net present value (NPV) method? How does the cost of capital serve as a screening tool when using the internal rate of return (IRR) method? Why should responsibilities for certain ..
|
Project charter should be developed at initiation of project
: A project charter should be developed at the initiation of a project. Most projects define a business case as a justification for why the project should be completed. Inventory turnover is a common and useful metric when evaluating efficiency of a su..
|
Training and development in human resource development
: Write a 1-2 page reflective paper on the various experiential learning approaches. Provide an example of how you would use at least two of the approaches in a training program.
|
As the number of smartphone and tablet devices increases
: As the number of smartphone and tablet devices increases, so does the risk that hackers and computer criminals will target these devices. Since they were first introduced, certain mobile devices have been vulnerable to eavesdropping and fraudulent ch..
|
As a result of their efforts to encourage diversity
: If Mitchell Gold reached out to a female employee to help her learn how to get ahead in the organization, Mitchell would be acting as: As a result of their efforts to encourage diversity, Mitchell Gold and Bob Williams can expect to see all of the fo..
|
What are the issues that affect voter turnout and why
: What is the fundamental/significant difference and similarities between Interest Groups and Political Parties? Party Identification (Tendencies based on factors) (Republican Party vs Democratic Party). What is Pluralism and Elitism? What are the issu..
|
Employer-instituted quotas-civil rights act
: Employer-instituted quotas are: not required by Title VII of the Civil Rights Act of 1964 but are permitted under the Social Security Act. not required by Title VII of the Civil Rights Act of 1964 or by Executive Order 11246. permitted by Title VII o..
|
Evaluate principles of workforce engagement and motivation
: What is Forecasting? What are Operations Planning & Scheduling? Discuss in detail three "hidden costs" of outsourcing. Evaluate the Principles of Workforce Engagement and Motivation.
|