Question

In: Computer Science

For this Discussion, you will analyze mobile security threats and evaluate countermeasures. Briefly describe your mobile...

For this Discussion, you will analyze mobile security threats and evaluate countermeasures.

Briefly describe your mobile device and another device currently on the market that uses a different OS. Explain the security vulnerabilities associated with each device. Explain the security solutions that would address the vulnerabilities. Finally, state which OS has more robust security and explain your reasoning.

Solutions

Expert Solution

Mobile security threats that we face and can face in regular life are as follows:

Data Leaks - Methods through which unauthorized parties get access to the confidential information stored in our mobile devices is a very common case. Information like messages, images, VoIP, etc are easily compromised in today's time. Main reasons of this is "riskwares" or the apps which acts like the advertisements but gives access to unauthorized parties.The other ways are mobile devices purchased from unknown suppliers or brands which have inbuilt malicious softwares designed for data leaks.

Countermeasures for this are: Do not install unknown apps. Install a proper antivirus, update and run it regularly. Do not by phones of unknown brands and from unknown suppliers.

Unsecured WiFi - Free WiFi are the most enticing feature that attracts all mobile users. This not only provides free network access but also gives access to the hackers connected to the same. Studies show that users have compromised VoIPs, leaked credentials, hacked IDs because of accessing such WiFis.

Countermeasures are: Minimize the access to unsecured WiFi present in any locations.

Network Spoofing - False access points are designed by the hackers which appears to be the safe WiFi zones to localites and other users. These are deployed at busy paths and locations which high traffic so as to trap as many users and get access to their devices and data for malicious purposes.

Countermeasures are: Do not use the same credentials or the patterns for signing up on such public places.

My device is an Android Device providing various android facilities and securities in particular. It has an inbuilt security feature which can be pattern, password, fingerprints, etc. It provides various apps and different interfaces. It gives us connectivity facilities like mobile data, WiFi, hotspot , etc.

Another device can be laptop which has its own OS(Windows, Linux, Mac). It helps in different IT sectors and various user level works. Laptops are real fast in computing and have vast storage with higher computing speed as compared to humans. It provides connectivity facilities, software to ease human efforts in computing, etc.

The above mentioned are common to both. Some other are :

Phishing attacks - Making a fake website or providing information from fake emails which looks like a legit ones are very common in laptops that makes the pc vulnerable.

Malwares - Malicious software installed / deployed in the computer so as to get the confidentials or to hamper the work. Very common in laptops.

Cookie hijacking - Sessions are created when mobile and laptops connect to a server and are stored as cookies in laptops at user side to make the connection secure and fast. Hijacking makes the severs and the laptops at vulnerabilities.

Security solutions can be : Not providing our emails to others or visiting an unknown site. Installing and updating the antiviruses present in the devices for security. Deleting cookies if not in use.

Linux has the most secure feature as firstly it is open source so nothing is hidden or cannot be corrected at user level. Secondly no .EXE file is runnable at it avoiding malwares and other attacks possible as the are mostly installed by a .EXE file.


Related Solutions

security threats briefly explain the meaning and possible countermeasures for each of the two. 1. Alteration...
security threats briefly explain the meaning and possible countermeasures for each of the two. 1. Alteration 2. Denial of service
What are factors in HIT that precipitate security threats and how will you, in your practice,...
What are factors in HIT that precipitate security threats and how will you, in your practice, protect your patients from these same threats?
Briefly describe a derivative security?
Briefly describe a derivative security?
Describe your plan or countermeasures, regarding to developing a Cost Estimating Relationship, as an engineer in...
Describe your plan or countermeasures, regarding to developing a Cost Estimating Relationship, as an engineer in controlling the effects/impacts given by the following items from the perspective of Engineering Economics - Direct labor hours -. Machine hours -. Number of units -. Number of production runs -. Number of orders
briefly describe your experience with HIPAA privacy or security regulations. Do you think too many or...
briefly describe your experience with HIPAA privacy or security regulations. Do you think too many or not enough resources are devoted to protecting health information? Why or why not? Explain fully. please 300 words
Briefly describe how you will evaluate the Bank of America's financial performance.
Briefly describe how you will evaluate the Bank of America's financial performance.
Describe and give examples of the 2 most significant computer security threats that are impacting the...
Describe and give examples of the 2 most significant computer security threats that are impacting the world at the present time. (b) What steps are being taken to minimize or thwart these threats? (c) Will the efforts proposed to protect individuals, companies and the governments from these threats still protect the rights of citizens? (d) Do you think that the steps taken or to be taken are ethical and will not cause a backlash in society? Please elaborate (beyond a...
You want to create your own mobile security policy. Provide an outline and, for each item...
You want to create your own mobile security policy. Provide an outline and, for each item in your outline, explain what you would write about in two to three sentences. The outline needs to include at least four topics to be covered in your mobile security policy.
describe briefly a conceptual model of the hydrological cycle includes in your discussion reasons for conceptualisation...
describe briefly a conceptual model of the hydrological cycle includes in your discussion reasons for conceptualisation of the hydrological cycle in the manner required for development of your model
Describe briefly a conceptual model of the hydrological cycle. Include in your discussion reasons for conceptualisation...
Describe briefly a conceptual model of the hydrological cycle. Include in your discussion reasons for conceptualisation of the hydrological cycle in the manner required for development of your model. (typing answer please)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT