Reply to post - mobile devices

Assignment Help Software Engineering
Reference no: EM131480021

Write a reply to this post.

Mobile devices provide a great platform for friends and family to share pictures and stay in touch, however, they can easily be manipulated to share too much information as well. According to the 2017 Symantec Internet Security Threat Report, mobile malware detections increased 105 percent from last year to 18.4 million in total.

This is partly due to the open architecture of Android OS, and because 40% of users reported they did not have any type of antivirus. Mobile malware continues to aggressively attack users because it is still effective, and profitable for hackers. This is because malware can take advantage of sending premium text messages, advertisements, ransomware and click fraud. Apple iOS is not immune from attacks like those experienced by Android based phones. According to D'orazio 2017, 91% of the 200 most popular iOS apps tested showed risky behavior, such as location tracking, identification of the user, access to contact list and address book, and in-app purchasing. The nature of app creation is designed for maximum download counts, and not necessarily with the users' security in mind. Apple was also a victim to three major Zero-Day vulnerabilities. Many users are simply too easily persuaded or manipulated into providing information. Many apps require ridiculous amounts of information as well. Some apps can even take control of the phone.

For example, "Jekyll" apps can stealthily post tweets, take photos, steal identity information, send e-mail and SMS messages, and exploit kernel vulnerabilities (D'orazio, 2017). As a CIO I would ensure all employees understood the vulnerabilities they can be exposed to through their personal phone. Because the employees are the first defense of a company.

I would provide quarterly interactive trainings where we would cover phone security settings and potential bad apps that may be popular at the time. This would help ensure employees not only know what to do, but they also practice it. Just as it says in the Bible, "Therefore you also must be ready, for the Son of Man is coming at an hour you do not expect." Jesus can come back at any moment, and he says to stand ready, being prepared at all times. We need to be prepared with our cyber security.

At any moment a new attack could happen, and if we are too trusting, or lazy with personal information, then we will be the newest victims. D'orazio, C. J., Lu, R., Choo, K. R., & Vasilakos, A. V. (2017).

A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. Applied Mathematics and Computation,293, 523-544. doi:10.1016/j.amc.2016.08.051 2017 Internet Security Threat Report. (n.d.).

Retrieved April 27, 2017, from

https://www.symantec.com/security-center/threat-report?inid=symc-home- page_ghp_to_security-center_threat-response

Verified Expert

The Seven Areas of Responsibility contain a comprehensive set of Competencies and Sub-competencies defining the role of the health education specialist. These Responsibilities were verified by the 2015 Health Education Specialist Practice Analysis (HESPA) project and serve as the basis of the CHES exam beginning in October 2016

Reference no: EM131480021

Questions Cloud

Consider the value chain and the firms value proposition : Consider the Value Chain and the firm’s Value Proposition. articulate your perceptions of the value proposition for four of these five firms:
Analyze the requirements of your state governments dnr : Examine the differences and similarities between the hospital's stance and HIPAA as to whether the nurse should be fired from her job.
Discuss the fixed exchange rate : Using the central bank balance sheet diagrams, evaluate how each of the following shocks affects a country's ability to defend a fixed exchange rate.
Importer of a homogeneous good : Consider a world with two countries, H and F. H is the importer of a homogeneous good produced by perfectly competitive firms and F is the exporter.
Reply to post - mobile devices : Mobile devices provide a great platform for friends and family to share pictures and stay in touch, however, they can easily be manipulated to share too much information as well.
Series of sensors and tags in the warehouse : You are monitoring a series of sensors and tags in the warehouse.
Do you think consumers support brands : Do you think consumers support brands that benefit society?
Global assessment question : Imagine a scenario in which you are a junior sales executive for a multinational firm selling a product line in many corners of the world.
What is the backing ratio : Consider the central bank balance sheet for the country of Riqueza. Riqueza currently has $1,800 million escudos in its money supply, $1,100 million.

Reviews

inf1480021

5/19/2017 5:16:25 AM

Hi, I adore you!! :) This is so extraordinary. I am so energized. Yes I comprehend what you have said and concur with you and it sounds good to me.

Write a Review

Software Engineering Questions & Answers

  Create a powerpoint presentation that will be communicated

create a powerpoint presentation that will be communicated to your manager and his fellow managers. as a group the

  Describe functional and nonfunctional requirement

Analyze and describe functional and nonfunctional requirements in software engineering.

  Describe two major erp systems

Create a 7-to10-slide presentation comparing and contrasting two major ERP systems from different ERP software providers. You may use various sources including the companies' websites

  Produce a software design specification document

Complete the template as best as you can. Make any reasonable assumptions based on your understanding of the problem that allow you to address as many sections of the SDD template as possible.

  Discuss two future trends in system development

Discuss two future trends in system development. How do you think they will affect the future development of systems in the health care industry

  Explain why the spi0cr1 and spi0cr2 control registers

Explain why the SPI0CR1 and SPI0CR2 control registers have to have those specified values by explaining the role played by each bit for each register.

  Explain activities that take place during each phase of sdlc

They have asked you to develop a presentation that explains the activities that take place during each phase of the SDLC to ensure software development success.

  Discuss the life cycle of a variable

Discuss the life cycle of a variable

  Perform the round-robin dispatch algorithm

Perform the Round-Robin dispatch algorithm, with time quantum equal to 300 milliseconds, on the job queue and calculate Average turn-around-time.

  Write different entities or objects for engineering firm

List the different entities or objects, logical processes, data flows and data stores that are involved, starting from the time you submitted your time sheet.

  The environment and the strategic business plan

1.What is the relationship between the environment and the strategic business plan? 2.What is the relationship between the firm's resources and the strategic business plan?

  Question about vector or bitmap

When your customer hands you a job, how would you make the determination which type of graphic is the right selection, Vector or Bitmap, in your response,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd