Reply to post - mobile devices

Assignment Help Software Engineering
Reference no: EM131480021

Write a reply to this post.

Mobile devices provide a great platform for friends and family to share pictures and stay in touch, however, they can easily be manipulated to share too much information as well. According to the 2017 Symantec Internet Security Threat Report, mobile malware detections increased 105 percent from last year to 18.4 million in total.

This is partly due to the open architecture of Android OS, and because 40% of users reported they did not have any type of antivirus. Mobile malware continues to aggressively attack users because it is still effective, and profitable for hackers. This is because malware can take advantage of sending premium text messages, advertisements, ransomware and click fraud. Apple iOS is not immune from attacks like those experienced by Android based phones. According to D'orazio 2017, 91% of the 200 most popular iOS apps tested showed risky behavior, such as location tracking, identification of the user, access to contact list and address book, and in-app purchasing. The nature of app creation is designed for maximum download counts, and not necessarily with the users' security in mind. Apple was also a victim to three major Zero-Day vulnerabilities. Many users are simply too easily persuaded or manipulated into providing information. Many apps require ridiculous amounts of information as well. Some apps can even take control of the phone.

For example, "Jekyll" apps can stealthily post tweets, take photos, steal identity information, send e-mail and SMS messages, and exploit kernel vulnerabilities (D'orazio, 2017). As a CIO I would ensure all employees understood the vulnerabilities they can be exposed to through their personal phone. Because the employees are the first defense of a company.

I would provide quarterly interactive trainings where we would cover phone security settings and potential bad apps that may be popular at the time. This would help ensure employees not only know what to do, but they also practice it. Just as it says in the Bible, "Therefore you also must be ready, for the Son of Man is coming at an hour you do not expect." Jesus can come back at any moment, and he says to stand ready, being prepared at all times. We need to be prepared with our cyber security.

At any moment a new attack could happen, and if we are too trusting, or lazy with personal information, then we will be the newest victims. D'orazio, C. J., Lu, R., Choo, K. R., & Vasilakos, A. V. (2017).

A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. Applied Mathematics and Computation,293, 523-544. doi:10.1016/j.amc.2016.08.051 2017 Internet Security Threat Report. (n.d.).

Retrieved April 27, 2017, from

https://www.symantec.com/security-center/threat-report?inid=symc-home- page_ghp_to_security-center_threat-response

Verified Expert

The Seven Areas of Responsibility contain a comprehensive set of Competencies and Sub-competencies defining the role of the health education specialist. These Responsibilities were verified by the 2015 Health Education Specialist Practice Analysis (HESPA) project and serve as the basis of the CHES exam beginning in October 2016

Reference no: EM131480021

Questions Cloud

Consider the value chain and the firms value proposition : Consider the Value Chain and the firm’s Value Proposition. articulate your perceptions of the value proposition for four of these five firms:
Analyze the requirements of your state governments dnr : Examine the differences and similarities between the hospital's stance and HIPAA as to whether the nurse should be fired from her job.
Discuss the fixed exchange rate : Using the central bank balance sheet diagrams, evaluate how each of the following shocks affects a country's ability to defend a fixed exchange rate.
Importer of a homogeneous good : Consider a world with two countries, H and F. H is the importer of a homogeneous good produced by perfectly competitive firms and F is the exporter.
Reply to post - mobile devices : Mobile devices provide a great platform for friends and family to share pictures and stay in touch, however, they can easily be manipulated to share too much information as well.
Series of sensors and tags in the warehouse : You are monitoring a series of sensors and tags in the warehouse.
Do you think consumers support brands : Do you think consumers support brands that benefit society?
Global assessment question : Imagine a scenario in which you are a junior sales executive for a multinational firm selling a product line in many corners of the world.
What is the backing ratio : Consider the central bank balance sheet for the country of Riqueza. Riqueza currently has $1,800 million escudos in its money supply, $1,100 million.

Reviews

inf1480021

5/19/2017 5:16:25 AM

Hi, I adore you!! :) This is so extraordinary. I am so energized. Yes I comprehend what you have said and concur with you and it sounds good to me.

Write a Review

Software Engineering Questions & Answers

  Define erp and describe its functionalities

Explain the role of MIS in enterprise resource planning (ERP). Conduct research to address the following items. Write a two-page report to the CEO in which you: Define ERP and describe its functionalities

  Discuss test strategy for your system

Provide a series of steps for the implementation of your system.

  Describe each law and define the terms in each law

Describe each law and define the terms in each law and explain the law clearly and thoroughly. Illustrate your explanation with practical examples - with at least one example for each law from software engineering.

  Every product or service has a buying process even digital

every product or service has a buying process even digital products and services. you will research and analyze the

  How the organization could benefit from using the sdlc

Analyze how the organization could benefit from using the systems development life cycle (SDLC), and what type of projects within the organization could benefit from this process.

  Q1 use the following method printprimes for questions a-f

q1 use the following method printprimes for questions a-f below.1. 2. finds and prints n prime integers4. 5. private

  Develop a java application for fedhire employees

ITECH7201 Software Engineering: Analysis and Design Assignment. You have been hired to design and develop a Java application for FedHire employees to manage the car rental system

  Aspects of a real estate agents business

Draw a UML class diagram that models the aspects of a real estate agents business that are described below.

  Write a program to implement selection sort

Write a program to implement selection sort.

  Er diagram to monitor students-write desirable constraints

Represent entire scenario with the help of ER Diagram. Also write desirable constraints and justify your design approach even in a single small step.

  Gather requirements for mom and pop

Suppose, you were asked to gather requirements for mom and pop store selling books. How would you go about getting requirements?

  Eplain your approach in managing this project via both a

you are the lead software engineer at a large educational institution consisting of twenty three 23 campuses located

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd