Menu

Device developers. Nichols, Lekkas & Lekkas (2001) wrote

0 Comment

Device data leakage is also another top-ranking
threat. Theft through malicious applications, data loss, and mobile malware are
all sources of data leakage. Even though numerous privileges of corporate
access on mobile devices are limited to the emails as well as calendar items,
emerging mobile corporate applications can tap various sources if the company
accepts to take risks. As noted by Yang et al. (2004), increased enterprise data
on the device raises the attention of cybercriminals. These cyber criminals can
target the devices as well as the back-end systems that are tapped into the
mobile malware. Therefore, if administrators and

Next, application security is a top
concern. A major problem with mobile applications is that they demand a lot of
privileges. This facilitates the access to various sources of data by the
device. As noted by Yang et al. (2004), numerous mobile applications, notably
the ones obtained freely, are created with ties to advertising networks, making
geolocation data, contacts as well as browsing history increasingly valuable to
the app developers. Nichols, Lekkas & Lekkas (2001) wrote that developers want
to monetize while consumers want free applications, and then advertising
networks pay developers of mobile applications to obtain all that juicy data
from users. As noted by Al Ameen, Liu & Kwak (2012), leaked location of
certain executives, calendar items, and even business contacts can
competitively disadvantage the company.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Misconfiguration
is also a major mobile and wireless security concern. Misconfiguration of
switches, as well as access points, present a key problem. This is because
wireless technology is a new technology, and administrators do not have
adequate experience as they do with wired networks. Al Ameen, Liu & Kwak
(2012) note that as with various other devices, default settings are many times
a no-no and devices have to be tuned to comply with the best practices as well
as policies.

The third key issue is the
unmanaged utilization of wireless network outside the enterprise. According to
Urbas & Krone (2006), more and more workers have become mobile in the
recent years. They utilize devices from outside as well as open networks. This
exposes these devices to malicious traffic. Particularly, this is true with the
Virtual Wi-Fi that is supported by Windows 7, as it enables neighbors to share
access to a device, e.g., a laptop. In the absence of Windows 7, laptops merely
serve as a customer on wireless networks. Virtual network, however, enables the
customer also to provide other clients with services. This, in turn, creates ad
havoc, peer-to-peer networks which are a threat to the security of the users.

Hacking is the second major threat
to mobile computing and wireless access. Active attackers on wireless
connections are an increasing problem since wireless, and mobile computing
provides more and more attractive targets to hackers. When the devices get
powerful enough, and the information held in these devices gets valuable
enough, people with malicious intentions are attracted to them. As such, these
devices may fall victim to exploits (Makki et al., 2007). 

Rogue access points are one of the
main mobile and wireless security concerns. According to Urbas & Krone
(2006), unmanaged, unknown and even unsanctioned devices inside the network
turn into wide-open doors, offering easy ways for information to leave the
network and malware to get in. A study conducted by Karlof & Wagner (2003)
found that SMS Trojans, which are designed to charge the owners of mobile
devices premium text messages, are the most common mobile malware. According to
experts, Android devices are the most vulnerable devices to this threat,
although other platforms can draw the attention of financially motivated
cybercriminals if they fail to adopt protective measures such as Near Field
communications among other technologies for mobile payment.

x

Hi!
I'm Alex!

Would you like to get a custom essay? How about receiving a customized one?

Check it out