Write reply to post - mobile device kill switch is it good

Assignment Help Software Engineering
Reference no: EM131479990

Write reply to this post (SS). Mobile device kill switch is it good or bad? When I did a search for when the kill switch came out the articles I find are within the last few years.

The thing is, this is not a new technology. In 2006, I worked for a company in Tulsa OK that had this feature provided by the cellular carrier on all the company phones. We would login to the cellular provides website, select the device and remote wipe. The mobile device kill switch is both good and bad depending on the scenario.

Let's take a look at the bad side first. If someone hacks the company that controls the software database; then they could kill everyone's phones.

As security professionals we are charge with gathering information. If we have a mobile device that was used as part of a crime, we would want to be able to recover data on that device. With a mobile kill switch the criminal or one of their co-conspirators could remote kill any locally stored data, hampering the investigation.

On the good side of the kill switch with the growing trend involving, "the number of violent thefts of smartphones on the streets of major U.S. cities has been rising. Some estimates say 1 in 3 thefts in the U.S. involve a smartphone" (Williams, M., 2014).

Smart phones now have apps that store personal data, i.e. bank cards, insurance information, email accounts and even apps to access bank accounts. The ability to remote kill is vital in reducing identity theft from the stored data. The access to who has the ability to remote wipe should be limited to only the user of the device. It should also be at the users' discretion if they want the ability and not. This should not be made mandatory by government.

This raises a concern of placing too much power in entity's control. There are states that have made it mandatory the software come preinstalled. California is one such state, "requiring kill switch technology in mobile phones manufactured after 1 July 2015" (Vaas, 20105). We pray that those who have the access to activate the kill switch will be good stewards.

That they will not abuse the ability but in service of each other just like Peter said. "Each of you should use whatever gift you have received to serve others, as faithful stewards of God's grace in its various forms" (NIV, 2011).

References Williams, M. (June 24, 2014), 10 things to know about the smartphone kill switch, (July 2, 2015), Smartphone anti-theft "kill switch" law goes into effect in California

Verified Expert

The Seven Areas of Responsibility contain a comprehensive set of Competencies and Sub-competencies defining the role of the health education specialist. These Responsibilities were verified by the 2015 Health Education Specialist Practice Analysis (HESPA) project and serve as the basis of the CHES exam beginning in October 2016

Reference no: EM131479990

Questions Cloud

Quantity of money demanded : Contrast that with the factors that would cause an increase in (b) the demand for money. Graph required.
Why is home interest rate higher under noncredible peg : A peg is not credible when investors fear depreciation in the future, despite official announcements. Why is the home interest rate always higher.
Transparency corruption index : Given that corruption at Siemens came as a surprise to German society, how credible is the Transparency Corruption Index that is based on the perception.
Demonstrate communication skills in the business environment : Purpose: The goal of this project is to show that you can demonstrate communication skills in the business and professional environment.
Write reply to post - mobile device kill switch is it good : Write reply to post (SS). Mobile device kill switch is it good or bad? When I did a search for when the kill switch came out the articles I find are within the last few years.
Discuss the reasons why european powers : In a short essay question discuss the reasons why European powers were able to colonize Africa during the great scramble as opposed to the reasons.
What social issues are raised in the video : How does the video you selected support a social process theory or a social development theory?What social issues are raised in the video?
Negative aspects of technology growth : What are some of the positive and negative aspects of technology growth?
Management reporting-discuss the allocation issue : MGMT Insurance Ltd. is an insurance company that accepts payments on various insurance policies from businesses across the island

Reviews

inf1479990

5/19/2017 5:05:05 AM

You made an incredible showing with regards to and I am TOTALLY, COMPLETELY AND THOROUGHLY SATISFIED!!!! I truly am upbeat and I wish I had discovered ExpertsMind.com from the begin.

Write a Review

Software Engineering Questions & Answers

  Determine the feasibility of whether the project

Required to determine the feasibility of whether the project should proceed or not - Produces high level overview of project relating requirements and scope.

  Where the sdlc do we most commonly search for requirements

What are some of the techniques in discovering the requirements (fact finding) for a system? Which ones work best? Which ones are the most economical? Where in the SDLC do we most commonly search for requirements

  What do you think are the key items and issues that require

question systems engineering organizations are often created for just one project.what do you think are the key items

  Create plan for converting shareware version to full version

Create the plan for converting shareware version to full version without paying one cent. If it is not possible for shareware to be converted to full version

  Describe the relationship between nmap and zenmap

What are some reasons an information security professional would scan a system or network of systems and  why is it important to learn at least a few commonly used ports and their associated services?

  Prepare an article review related to the topic

Prepare an article review related to the topic that you researched in the research/reading assignments from the assigned module/week.

  Explain the adapter pattern using the standard format

Explain the Adapter Pattern using the standard format. Explain the Scrum agile model with a diagram. Explain the four "organizational paradigms" for software engineering teams.

  Assess online tutorials and online communities in regard to

online communities please respond to the followingevaluate online tutorials and online communities in regard to helping

  How is this model different from other cmms

The five levels are Initial, Repeatable, Defined, Managed, and Optimizing. How is this model different from other CMMs?

  Explain the proposed e-commerce website

explain the proposed e-commerce Website and how it is new/different than other/or existing Websites.

  Use the strayer library or other libraries of your choice

you have been hired as the cio of a large multinational internet advertising company. the president of the company is

  Identify a full information system for a small company

You will use the information learned throughout the course to identify and document a full information system for a small company.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd