How can these devices automatically track a users location

Assignment Help Management Information Sys
Reference no: EM131878058

As the number of smartphone and tablet devices increases, so does the risk that hackers and computer criminals will target these devices. Since they were first introduced, certain mobile devices have been vulnerable to eavesdropping and fraudulent charges. In addition, many of them automatically track a user's location.

The major security risks associated with mobile devices include:28 Malware-Android apps, in particular, are vulnerable to malware because of the platform's openness. To guard against malware threats, users have to upload the most recent versions of the operating system and use mobile security tools.

Premium SMS billing-With their devices' vulnerability to malware, smartphone users face an added risk of subscribing to premium text-messaging services that charge every time users interact with them. Most cell phone carriers allow subscribers to block premium SMS messaging, however.

E-mail and SMS phishing-Because it is more difficult to establish a link's legitimacy on a mobile device, mobile users are more likely to click on them, which is a phisher's dream come true.

Mobile users should therefore use a lot of caution when using e-mail on these devices. Spyware-Commercially available software can be used by intruders to track and control the user's mobile activities. Malicious Web sites- These could pose a threat in the future, given that many smartphone browsers are based on a browser engine with vulnerabilities. Many of the recommendations discussed in Chapters 4 and 5 apply here.

Never leave your mobile device unlocked. Never leave it unattended. Always protect it with a password.

Answer the following questions:

1. What are some examples of security risks associated with a mobile device?

2. How can these devices automatically track a user's location?

3. What are a couple of recommendations for protecting your mobile device against these threats?

Reference no: EM131878058

Questions Cloud

Breakdown structure and change control connected : How are the work breakdown structure and change control connected?
What aspects prevented this from being done in the past : What aspects prevented this from being done in the past? What are current and future trends?
Concepts of chain of command : Do employees really need to know who reports to whom and who is responsible for what? Explain your position.
How have changes in society influenced : How have changes in society influenced how this crime is defined? How have the changes influenced legal outcomes? Has punishment of the crime changed over time?
How can these devices automatically track a users location : What are some examples of security risks associated with a mobile device?How can these devices automatically track a user's location?
Why did he identify the faerie queeneas an allegory : What was Spenser's intent in creating such a wide-ranging allegorical tale?
Manufacturing postponement-geographic postponement : Manufacturing postponement and Geographic postponement, give a practical example of each type as applied in the aviation/aerospace industry.
Adapt an effective corporate ethics and compliance program : Discuss the five reason to adapt an effective corporate ethics and compliance program in regards to your company?
What is the optimal value of the objective function : The objective of a linear programming problem is to maximize 1.50A + 1.50B, subject to 3A + 2B = 600, 2A + 4B = 600, 1A + 3B = 420, and A,B = 0.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd