How can these devices automatically track a users location

Assignment Help Management Information Sys
Reference no: EM131878058

As the number of smartphone and tablet devices increases, so does the risk that hackers and computer criminals will target these devices. Since they were first introduced, certain mobile devices have been vulnerable to eavesdropping and fraudulent charges. In addition, many of them automatically track a user's location.

The major security risks associated with mobile devices include:28 Malware-Android apps, in particular, are vulnerable to malware because of the platform's openness. To guard against malware threats, users have to upload the most recent versions of the operating system and use mobile security tools.

Premium SMS billing-With their devices' vulnerability to malware, smartphone users face an added risk of subscribing to premium text-messaging services that charge every time users interact with them. Most cell phone carriers allow subscribers to block premium SMS messaging, however.

E-mail and SMS phishing-Because it is more difficult to establish a link's legitimacy on a mobile device, mobile users are more likely to click on them, which is a phisher's dream come true.

Mobile users should therefore use a lot of caution when using e-mail on these devices. Spyware-Commercially available software can be used by intruders to track and control the user's mobile activities. Malicious Web sites- These could pose a threat in the future, given that many smartphone browsers are based on a browser engine with vulnerabilities. Many of the recommendations discussed in Chapters 4 and 5 apply here.

Never leave your mobile device unlocked. Never leave it unattended. Always protect it with a password.

Answer the following questions:

1. What are some examples of security risks associated with a mobile device?

2. How can these devices automatically track a user's location?

3. What are a couple of recommendations for protecting your mobile device against these threats?

Reference no: EM131878058

Questions Cloud

Breakdown structure and change control connected : How are the work breakdown structure and change control connected?
What aspects prevented this from being done in the past : What aspects prevented this from being done in the past? What are current and future trends?
Concepts of chain of command : Do employees really need to know who reports to whom and who is responsible for what? Explain your position.
How have changes in society influenced : How have changes in society influenced how this crime is defined? How have the changes influenced legal outcomes? Has punishment of the crime changed over time?
How can these devices automatically track a users location : What are some examples of security risks associated with a mobile device?How can these devices automatically track a user's location?
Why did he identify the faerie queeneas an allegory : What was Spenser's intent in creating such a wide-ranging allegorical tale?
Manufacturing postponement-geographic postponement : Manufacturing postponement and Geographic postponement, give a practical example of each type as applied in the aviation/aerospace industry.
Adapt an effective corporate ethics and compliance program : Discuss the five reason to adapt an effective corporate ethics and compliance program in regards to your company?
What is the optimal value of the objective function : The objective of a linear programming problem is to maximize 1.50A + 1.50B, subject to 3A + 2B = 600, 2A + 4B = 600, 1A + 3B = 420, and A,B = 0.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How is quality of healthcare data defined

How is quality of healthcare data defined? In terms of accuracy, completeness, or relevance? If there are multiple or conflicting definitions of quality, in your opinion, which is the best definition? What are the factors that contribute to poor data..

  How the fish bone diagram is created

Research and explain the Fish Bone tool, and how it can be used in the project management process.

  What consequences are there to having a long copyright term

What reasons are there for having copyright terms last this long? What consequences are there to having a long copyright term?

  Strategies on how to manage the risks

Identify and elaborate at least FOUR (4) potentials risks associated with project - conduct a workshop on requirement gathering for the IT systems

  Information systems- sql serversusing the online library

information systems- sql serversusing the online library the internet and all course materials locate information about

  How would you apply the four ethical principles to example

Do health care workers have the right to conscientiously object to providing care if it varies from their own personal moral and ethical belief system?

  What aspect is most lacking in corporate planning

Disaster recovery has been the topic of study this week. What do you think is the most difficult and expensive disaster to plan for?

  Impact of global expansion on supply chain practices - what

impact of global expansion on supply chain practices - what impact has global expansion had on supply chain

  Identifying and describing how information is used

Identifying and describing how information is used and how it flows in an organization. Explain this use in your current place of employment or an organization you are familiar with.

  What leadership or management violation has victor committed

What ethical leadership and management violation has Victor committed? Explain. What white-collar crimes, if any, did Victor and John commit?

  Discuss the implications of this concept on the cio

Reflect upon Robert Stephens' discussion of "Freedom with Fences" from Chapter 1 of CIO Best Practices. Discuss the implications of this concept on the CIO, the IT organization, and the technologies that are managed by the IT organization

  Techniques that may be used to provide transmission security

Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd