Research Paper on Mobile Computing Security

User Generated

qubavz

Computer Science

Description

Write a 4-6 pages report (Microsoft Word).

What are some of the current trends organizations face with mobile computing security and what are some of the remediation steps companies take to ensure data confidentiality and integrity?

Make sure you include the following:

  1. Include a summary paragraph/abstract at the beginning of the report.
  2. Include an introduction, conclusion and subheadings.
  3. Include all references (books, web sites, etc.) where you collected your information.

The paper should contain at least 4-6 pages of content not count the title page and a reference page.

*No Plagiarism

*APA format

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: MOBILE COMPUTING

1

Mobile Computing
Name
Institution

MOBILE COMPUTING

2
Abstract

Mobile computing is not essentially a new invention to the computer world; however,
with increased speed, ease of access, and acceptance, the use of smartphones is fast becoming a
significant piece of client’s daily lives. Currently, many organizations are taking up mobile
computing technology as a new way of accessing company resources in many locations. The fast
growth of mobile devices such as tablets and smartphones in the customer’s space has resulted in
a remarkable demand by clients to bring mobile computing technology into the corporate world.
However, similar to other technologies, mobile computing exhibits security concerns, hence,
posing information security risks to enterprise administrators.
Introduction
Mobile computing is of serious concern as it brings threats to both the user and the
corporate landscape. Mobile devices used by companies compile a considerable amount of
sensitive information which must be managed to safeguard the confidentiality of the consumer as
well as the intellectual property of the organization. All smartphones are susceptible to cyber
attacks. Criminals achieve this through diverse ways including; use of wireless media such as
Wi-Fi networks, utilization of software susceptibleness from the operating system, and use of
virulent software that depends on the weak understanding of users. To this effect, organizations
are developing diverse security counter-measures to prevent a data breach and maintain the
firm’s information privacy. Therefore, this paper will discuss mobile computing security trends
the corporate face and the remediation steps they take to ensure data confidentiality and integrity.
Information Loss due to Lost, Stolen, or Decommissioned Mobile Devices
Due to their portability, mobile devices can be carried everywhere by users. As a result,
theft or loss of the device could result in first, loss of information stored in the gadget, hence,

MOBILE COMPUTING

3

grave consequences to the firm involved. Second, an organization faces a threat of data leakage
if the device lost or stolen has no or weak passwords access, or has little or totally no encryption.
In certain instances, users may discard their mobile devices with weak knowledge of risk to their
data. Acc...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags