Unit 8 Assignment 1 Security Concerns and Mitigation Strategies
A networked technology that I use at home, at work, and at my personal convenience along with almost everyone else is my cellphone. Our cellphone’s are at a high risk of potential threats at nearly all times of the day. Some of the threats cell phones faces are simple that should be quick to mitigate while others may take a hacker trying to get access to your cell phone.
First and foremost the first thing that most people fail to enable on their cell phones as well as myself is a password or way to authenticate the user. All I have to do is swipe the screen and I’m in. It’s quick, it’s convenient, and it’s very unsecure. The best way to mitigate this is to implement authentication measures on the cell phone. Some cell phones can use biometrics, while most still use either a pattern or pin number to gain access.
Wifi is the blood line of the modern cell phone. More people use their cell phone to use the internet than they do to actually make calls anymore. With this comes many risk, and the first is that a lot of the data being sent and received isn’t encrypted. Things such as emails and social media applications usually don’t encrypt for quick use. This makes it easy for data to be captured or eavesdropped on. A way to mitigate this is by using applications that encrypt data or installing an application to encrypt data that is sent or received from the cell phone so even if the data is intercepted it is not readable without decrypting it.
Another very likely threat that cell phone users face is malware. Apps, apps, apps, everyone loves apps. They make life so much simpler, but we also don’t know what is on the app before we download it to the cell phone. A user could download an app and also be downloading malware without even knowing it. The malware could then infect the rest of the system. In order to mitigate this threat you should install security software on your cell phone. Scan applications before downloading them. Also research the app and its developer to see if they are reputable.
These are just three potential threats that may affect cell phones. There are many more and hackers are always making more.
Place an Order
Plagiarism Free!
Create an Account
Create an account at Top Tutor Online
- Allows you to track orders.
- Receive personal messages.
- Send messages to a tutor.
Post a Question/ Assignment
Post your specific assignment
- Tutors will be notified of your assignment.
- Review your question and include all the details.
- A payment Link will be sent to you.
Wait for your Answer!
Make payment and wait for your answer
- Make payment in accordance with the number of pages to be written.
- Wait for your Answer as a professional works on your paper.
- You will be notified when your Answer is ready.