Reference no: EM131689324
The security of Smartphones is the focus for the First Research Paper. Deliverables for First Research Paper
1. Clearly identify the Mobile Device you own and are researching
2. What vulnerabilities are common to the Mobile Device?
3. What security practices can users follow to minimize these vulnerabilities?
4. Why does the Mobile Device need to be secured?
5. What vulnerabilities are present with public Wi-Fi?
- Clearly identify how cryptography can be used to establish secure remote connections
- WithMobile Devices using the Internet (an insecure communication channel)
- To your workplace and school
- To your bank to check balances, pay bills, and make other transfers
- For ecommerce
- Health data
6. How can email can be done securely using encryption with
- Open Source Pretty Good Privacy (PGP)
- Secure Multipurpose Internet Mail Extension (S/MIME).
7. How can Text messages be secured?
As you are doing research and writing your paper, think about the following
- How can cryptography can be used to facilitate security?
- How is it implemented?
- How can the security of Mobile Devices be improved (future directions)?
Format for the Research Paper
- Research Paper is to be at 4-6 content pages (submitted in Microsoft Word
- .docx format or PDF format)
- One (1) page Summary about the enhancing security of the Mobile Device and how to make remote connections more secure and less vulnerable
- Three (3) to five (5) pages about what you discovered through your research
- At least five (5) academic and/or professional quality references (not Wikipedia or Vendor's White Papers)
- One (1) page reference (APA format)
- In text citations corresponding to your references (APA format)
Please be sure to submit work that is a result of your own effort: plagiarism is unacceptable - for more details, please see the Academic Integrity Policy in the Syllabus section.
Explain and outline the concept of cryptanalysis
: Explain and outline the concept of Cryptanalysis, what it is, its linkage to the field of encryption, its sub-components, and its relevance in the modern.
|
Assess current advanced attacks and cve vulnerabilities
: Assess current advanced attacks and CVE vulnerabilities. What are some examples of exploitation or proposed proper defenses that can be deployed to prevent.
|
Define a population-frame and sampling method
: If you were to perform a similar study in the geographic area where you live, define a population, frame, and sampling method you could use.
|
What challenges are there with cloud computing
: What challenges are there with cloud computing? Why is the Internet often considered the cause of cyber security issues?
|
Security of smartphones is the focus
: The security of Smartphones is the focus for the First Research Paper. Deliverables for First Research Paper
|
Define frequency distribution of the number of heads
: Toss a coin 10 times and record the number of heads. If each student performs this experiment five times, a frequency distribution of the number of heads.
|
Discuss about the sensual and perceptual theories
: Three simple capital letters in a block font, conjures images of traditional corporate America.
|
Describe which of the four factors was used in justification
: Find a URL for a patent case where the patent was found to be invalid. Describe which of the four factors was used in the justification.
|
Consequences for individuals and for society
: Question: Is the right to privacy rapidly becoming a thing of the past? If so, what are the consequences for individuals and for society?
|