Dangers of Mobile Computing Paper

Anonymous

Question Description

This is a group paper and I am responsible for question number 2 below. My part just has to be at least 4-5 pages.

Tutor Answer

EinsteintheProf
School: University of Virginia

Am already done.

Running head: DANGERS OF MOBILE COMPUTING

Dangers of mobile computing
Name
University Affiliation

1

DANGERS OF MOBILE COMPUTING

2

Dangers of mobile computing
The mobile computing includes communication among the computing devices where
there are no restrictions to the devices on a single place. The efficiency of mobile computing
varies based on the distribution of the required infrastructure. The devices involved in mobile
computing include small portable computers, mobile phones, laptops, and Personal Digital
Assistance devices (Becher, 2011). Ghosh & Swaminatha (2011) indicates that mobile
computing can pose severe risks to the device owners and the organization because of their poor
state of security when compared to the desktops. The increase in the number of mobile
computing devices in recent years has resulted in an equal increase in the threats among these
devices. Other than the already existing threats, new and more sophisticated threats are
emerging, creating the need for readiness to secure mobile computing even further against the
imminent threats.
Insecure mobile configurations can pose a severe threat to the user’s information and
privacy, especially with the new devices. Jain & Shanbhag (2012) notes that some of the mobile
devices can contain vulnerable operating systems during the purchase, hence putting the device
at the risk of being attacked by the known vulnerabilities. The mobile devices that do not have
access control mechanisms such as fingerprinting and pin lock can be subject to use by
unauthorized persons who access the device. According to Ghosh & Swaminatha (2011),
attackers can access different types of malware that can enable them to access and obtain
sensitive data from another person maliciously. It is always crucial that users protect the data
stored in their devices against malicious attackers through physical tampering, observing
security-specific networks, and avoidance of supplying chains that provide unsecured or
compromised mobile devices.

DANGERS OF MOBILE COMPUTING

3

Attackers can compromise different capabilities of the computing devices using di...

flag Report DMCA
Review

Anonymous
Thanks for the help.

Anonymous
Outstanding. Studypool always delivers quality work.

Anonymous
Tutor was very helpful and took the time to explain concepts to me. Very responsive, managed to get replies within the hour.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors