Reply to post - mobile devices

Assignment Help Software Engineering
Reference no: EM131480021

Write a reply to this post.

Mobile devices provide a great platform for friends and family to share pictures and stay in touch, however, they can easily be manipulated to share too much information as well. According to the 2017 Symantec Internet Security Threat Report, mobile malware detections increased 105 percent from last year to 18.4 million in total.

This is partly due to the open architecture of Android OS, and because 40% of users reported they did not have any type of antivirus. Mobile malware continues to aggressively attack users because it is still effective, and profitable for hackers. This is because malware can take advantage of sending premium text messages, advertisements, ransomware and click fraud. Apple iOS is not immune from attacks like those experienced by Android based phones. According to D'orazio 2017, 91% of the 200 most popular iOS apps tested showed risky behavior, such as location tracking, identification of the user, access to contact list and address book, and in-app purchasing. The nature of app creation is designed for maximum download counts, and not necessarily with the users' security in mind. Apple was also a victim to three major Zero-Day vulnerabilities. Many users are simply too easily persuaded or manipulated into providing information. Many apps require ridiculous amounts of information as well. Some apps can even take control of the phone.

For example, "Jekyll" apps can stealthily post tweets, take photos, steal identity information, send e-mail and SMS messages, and exploit kernel vulnerabilities (D'orazio, 2017). As a CIO I would ensure all employees understood the vulnerabilities they can be exposed to through their personal phone. Because the employees are the first defense of a company.

I would provide quarterly interactive trainings where we would cover phone security settings and potential bad apps that may be popular at the time. This would help ensure employees not only know what to do, but they also practice it. Just as it says in the Bible, "Therefore you also must be ready, for the Son of Man is coming at an hour you do not expect." Jesus can come back at any moment, and he says to stand ready, being prepared at all times. We need to be prepared with our cyber security.

At any moment a new attack could happen, and if we are too trusting, or lazy with personal information, then we will be the newest victims. D'orazio, C. J., Lu, R., Choo, K. R., & Vasilakos, A. V. (2017).

A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. Applied Mathematics and Computation,293, 523-544. doi:10.1016/j.amc.2016.08.051 2017 Internet Security Threat Report. (n.d.).

Retrieved April 27, 2017, from

https://www.symantec.com/security-center/threat-report?inid=symc-home- page_ghp_to_security-center_threat-response

Verified Expert

The Seven Areas of Responsibility contain a comprehensive set of Competencies and Sub-competencies defining the role of the health education specialist. These Responsibilities were verified by the 2015 Health Education Specialist Practice Analysis (HESPA) project and serve as the basis of the CHES exam beginning in October 2016

Reference no: EM131480021

Questions Cloud

Consider the value chain and the firms value proposition : Consider the Value Chain and the firm’s Value Proposition. articulate your perceptions of the value proposition for four of these five firms:
Analyze the requirements of your state governments dnr : Examine the differences and similarities between the hospital's stance and HIPAA as to whether the nurse should be fired from her job.
Discuss the fixed exchange rate : Using the central bank balance sheet diagrams, evaluate how each of the following shocks affects a country's ability to defend a fixed exchange rate.
Importer of a homogeneous good : Consider a world with two countries, H and F. H is the importer of a homogeneous good produced by perfectly competitive firms and F is the exporter.
Reply to post - mobile devices : Mobile devices provide a great platform for friends and family to share pictures and stay in touch, however, they can easily be manipulated to share too much information as well.
Series of sensors and tags in the warehouse : You are monitoring a series of sensors and tags in the warehouse.
Do you think consumers support brands : Do you think consumers support brands that benefit society?
Global assessment question : Imagine a scenario in which you are a junior sales executive for a multinational firm selling a product line in many corners of the world.
What is the backing ratio : Consider the central bank balance sheet for the country of Riqueza. Riqueza currently has $1,800 million escudos in its money supply, $1,100 million.

Reviews

inf1480021

5/19/2017 5:16:25 AM

Hi, I adore you!! :) This is so extraordinary. I am so energized. Yes I comprehend what you have said and concur with you and it sounds good to me.

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd