Reply to post - mobile devices

Assignment Help Software Engineering
Reference no: EM131480021

Write a reply to this post.

Mobile devices provide a great platform for friends and family to share pictures and stay in touch, however, they can easily be manipulated to share too much information as well. According to the 2017 Symantec Internet Security Threat Report, mobile malware detections increased 105 percent from last year to 18.4 million in total.

This is partly due to the open architecture of Android OS, and because 40% of users reported they did not have any type of antivirus. Mobile malware continues to aggressively attack users because it is still effective, and profitable for hackers. This is because malware can take advantage of sending premium text messages, advertisements, ransomware and click fraud. Apple iOS is not immune from attacks like those experienced by Android based phones. According to D'orazio 2017, 91% of the 200 most popular iOS apps tested showed risky behavior, such as location tracking, identification of the user, access to contact list and address book, and in-app purchasing. The nature of app creation is designed for maximum download counts, and not necessarily with the users' security in mind. Apple was also a victim to three major Zero-Day vulnerabilities. Many users are simply too easily persuaded or manipulated into providing information. Many apps require ridiculous amounts of information as well. Some apps can even take control of the phone.

For example, "Jekyll" apps can stealthily post tweets, take photos, steal identity information, send e-mail and SMS messages, and exploit kernel vulnerabilities (D'orazio, 2017). As a CIO I would ensure all employees understood the vulnerabilities they can be exposed to through their personal phone. Because the employees are the first defense of a company.

I would provide quarterly interactive trainings where we would cover phone security settings and potential bad apps that may be popular at the time. This would help ensure employees not only know what to do, but they also practice it. Just as it says in the Bible, "Therefore you also must be ready, for the Son of Man is coming at an hour you do not expect." Jesus can come back at any moment, and he says to stand ready, being prepared at all times. We need to be prepared with our cyber security.

At any moment a new attack could happen, and if we are too trusting, or lazy with personal information, then we will be the newest victims. D'orazio, C. J., Lu, R., Choo, K. R., & Vasilakos, A. V. (2017).

A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. Applied Mathematics and Computation,293, 523-544. doi:10.1016/j.amc.2016.08.051 2017 Internet Security Threat Report. (n.d.).

Retrieved April 27, 2017, from

https://www.symantec.com/security-center/threat-report?inid=symc-home- page_ghp_to_security-center_threat-response

Verified Expert

The Seven Areas of Responsibility contain a comprehensive set of Competencies and Sub-competencies defining the role of the health education specialist. These Responsibilities were verified by the 2015 Health Education Specialist Practice Analysis (HESPA) project and serve as the basis of the CHES exam beginning in October 2016

Reference no: EM131480021

Questions Cloud

Consider the value chain and the firms value proposition : Consider the Value Chain and the firm’s Value Proposition. articulate your perceptions of the value proposition for four of these five firms:
Analyze the requirements of your state governments dnr : Examine the differences and similarities between the hospital's stance and HIPAA as to whether the nurse should be fired from her job.
Discuss the fixed exchange rate : Using the central bank balance sheet diagrams, evaluate how each of the following shocks affects a country's ability to defend a fixed exchange rate.
Importer of a homogeneous good : Consider a world with two countries, H and F. H is the importer of a homogeneous good produced by perfectly competitive firms and F is the exporter.
Reply to post - mobile devices : Mobile devices provide a great platform for friends and family to share pictures and stay in touch, however, they can easily be manipulated to share too much information as well.
Series of sensors and tags in the warehouse : You are monitoring a series of sensors and tags in the warehouse.
Do you think consumers support brands : Do you think consumers support brands that benefit society?
Global assessment question : Imagine a scenario in which you are a junior sales executive for a multinational firm selling a product line in many corners of the world.
What is the backing ratio : Consider the central bank balance sheet for the country of Riqueza. Riqueza currently has $1,800 million escudos in its money supply, $1,100 million.

Reviews

inf1480021

5/19/2017 5:16:25 AM

Hi, I adore you!! :) This is so extraordinary. I am so energized. Yes I comprehend what you have said and concur with you and it sounds good to me.

Write a Review

 

Software Engineering Questions & Answers

  Assignment questionschoose one information system an

assignment questionschoose one information system an example of the system can be australian tax return system net bank

  Define metrics that will be collected to track effectiveness

Define the metrics that will be collected to track the effectiveness of software assurance in the company. Include a description of how each of the metrics will be obtained and used.

  Software development strategies

Scrum vs. Plan-Based Software Development Strategies, You are the lead software engineer at a large educational institution consisting of twenty three (23) campuses located across the Midwestern United States

  Suggestions for viable guidelines

Do you think that variations in company and societal culture could pose a significant problem when coordinating or scheduling large assignments,

  Brands of virtualization software available

Compare and contrast the top three (3) brands of virtualization software available. Focus your efforts on components such as standard configuration, hardware requirements price, and associated costs

  Perform modeling to assist with analysis and decision making

Perform modeling to assist with analysis and decision making. Effectively communicate with stakeholders to determine, manage, and document business requirements throughout the SDLC.

  Why is it important for an organization to have formal sdlc

Describe at least two different approaches to a formal SDLC. What type of specific health care system would match well with each? Why is it important for an organization to have a formal SDLC

  Aimdevelop practical application of models techniques and

aimdevelop practical application of models techniques and approaches in social marketing to an identified social issue

  Find problems which software engineers dealt with in past

The lecture and text discussed challenges and problems which Software Engineers have dealt with in the past. Investigate what you consider to be the challenges facing software engineering in the next 20 years.

  Present an argument against lines of code

Present an argument against lines of code as a measure for software productivity. Will your case hold up when dozens or hundreds of projects are considered?

  Create a uml class diagram for the system

Create a UML class diagram for the system. Select the classes. For each class, list at least one attribute and one operation and draw a possible class diagram.

  Comprise a discussion of the information-gathering methods

write a 1400- to 2100-word paper that analyzes a work-related project using systems analysis for a selected business

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd