research essay on security assessment for mobile devices
DESCRIPTION
Current mobile technology has almost transformed mobile phones and tablets into normal PCs that they can flexibly install various applications with different usages. This enables the mobile devices to play a bigger role in production and broadens the borders of enterprise information system. However, it also provides a hotbed for the malware to spread them onto mobile devices to reach different illegal purposes(Leavitt, 2005).According to the statistics, there is a significant increase of the security exploits attempted on the mobile devices in order to attain illegal profits or the sensitive information, and the device owners are becoming more severe victims in the information warfare(Niekerk & Maharaj, 2010). Currently, complex attacking techniques and strategies are being migrated to mobile devices by cyber criminals. According to research findings (Juniper Networks Inc, 2012), there is more mobile malware than ever before, and the malware has become smarter and more stealthy to avoTRANSCRIPT
![Page 1: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/1.jpg)
Research Report on mobile security
Research questions discussed are: 1. What is the current situation of mobile phone security?
2. What are the major security assessment process/processes that are available used to
protect data in the mobile world?
3. What is the current development of the defence technique/strategies for mobile security?.
Published by: https://expertassignmenthelp.com/
Filename: 1SAMPLE16C27-Research-Report-on-mobile-security.PDF
For more free samples visit: https://expertassignmenthelp.com/Information-technology-assignment-help/
Uploaded: April 26, 2016
Enjoy
Abstract
With millions of consumers currently using mobile devices like cell phones, tablet
computers and smart phones to communicate, obtain and share information, there is an ever
growing reliance on mobile interactions. With the rising use of mobile devices and information
access, the number of variants of malicious malware and other techniques for intrusion, and
data threat is also rising like never before. This research was aimed at identifying the current
status of the mobile devices with regard to their security assessment. The research revealed a
systematic taxonomy of mobile data based on the confidential nature and identified sources. It
identified common sources of threats in the form of cyber criminals, botnet operators, hackers,
terrorists and foreign governments, followed by a comprehensive categorization of security
attacks. The common security issues in mobile devices were also studied with regard to lack
of passwords, missing authentication, unencrypted wireless transmission, issues with malware,
security software, out of date operating system, and poorly secured communication channels.
Certain key security controls were observed for individual users in the form of building anti-
malware capabilities, relying on encryption, authentication, firewall, security updates and
whitelisting techniques. Similarly, some key controls were studied for organizations in the form
of intrusion detection system, firewall, VPN implementation, along with the need to build a
centralized security system. The growing importance, application and options for bio-
information based mobile security, was also an important element in this research. Lastly, an
assessment was made with regard to the defensive tools and technologies against malware
attacks, in the form of the growing trends towards mobile device management, containerization
and virtualization.
![Page 2: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/2.jpg)
![Page 3: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/3.jpg)
![Page 4: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/4.jpg)
![Page 5: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/5.jpg)
![Page 6: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/6.jpg)
![Page 7: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/7.jpg)
![Page 8: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/8.jpg)
![Page 9: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/9.jpg)
![Page 10: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/10.jpg)
![Page 11: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/11.jpg)
![Page 12: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/12.jpg)
![Page 13: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/13.jpg)
![Page 14: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/14.jpg)
![Page 15: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/15.jpg)
![Page 16: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/16.jpg)
![Page 17: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/17.jpg)
![Page 18: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/18.jpg)
![Page 19: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/19.jpg)
![Page 20: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/20.jpg)
![Page 21: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/21.jpg)
![Page 22: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/22.jpg)
![Page 23: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/23.jpg)
![Page 24: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/24.jpg)
![Page 25: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/25.jpg)
![Page 26: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/26.jpg)
![Page 27: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/27.jpg)
![Page 28: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/28.jpg)
![Page 29: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/29.jpg)
![Page 30: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/30.jpg)
![Page 31: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/31.jpg)
![Page 32: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/32.jpg)
![Page 33: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/33.jpg)
![Page 34: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/34.jpg)
![Page 35: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/35.jpg)
![Page 36: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/36.jpg)
![Page 37: Research Essay on Security Assessment for Mobile Devices](https://reader034.vdocument.in/reader034/viewer/2022052514/579078791a28ab6874c29315/html5/thumbnails/37.jpg)