123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

Mobile Computing Security

Profile Picture
By Author: sherry roberts
Total Articles: 99
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Abstract
Mobile computing refers to any means of using a computer while outside the corporate office.It includes working from home, road, airport, or a hotel. When organizations go mobile, there tend to be essential considerations beyond cost and getting managers, employees, and stakeholders on board. All mobile platforms are usually at risk, and there are many security threats in relation to mobile computing.The attack usually put data at risk from different fronts; thus, requiring a new force in network security. Mobile computing tends to cause some threats to the user and the corporate environment.
Trends organizations face with mobile computing security
Mobile computing is the ability to communicate and computing while, on the move.Mobile computing tends to eradicate the need for confinement within one physical location. With the increase in mobile computing, organizations are now finding important to address how to provide the best balance of convenience and security (Ladan, 2013). With the increase in the number of mobile users, there is an alarming increase in mobile threats. Organizations should focus ...
... more attention on data loss prevention because of the increasing number of security breaches. As mobile computing continues to increase, organizations are considering important measures so as to protect data in transit and data at rest (Talukdar, 2010). Data at rest is data stored on a device while data in transit is the way information flow over a network.
An issue that organizations face with mobile computing security is unauthorized access. Users tend to be stealing login credentials for the applications on their mobile devices; thus, making access to corporate resources a click or tap away. With this possibility, unauthorized users tend to have easy access to corporate accounts and applications, social media and many more. Another issue organizations are facing as a result of mobile computing security, is loss and theft (Talukdar, 2010). Users of the mobile devices usually store a significant amount of very sensitive corporate data on their mobile devices. These data can include customer databases, business email, corporate presentation, and business plans. In such a situation, it will only take a hurried user to leave their device in a taxicab for significant data loss to occur.Another trend in mobile computing security is malware detection. The way that attackers can infiltrate continues to be expanding, and it is becoming very easy to infect networks and devices without the organization noticing (Ladan, 2013). Most organizations are facing this problem, and mobile malware is capable of stealing sensitive data, collect user data, and rack up long distance phone charges.It is also possible for attackers to use mobile malware in performing targeted attacks against the mobile device users.
Steps to ensure data confidentiality and integrity
Protecting the data means protecting its integrity,confidentiality, and availability.Failure to protect data can result to legal liability,loss of company goodwill, and business losses. In order to protect data, organizations have been considering various steps to ensure data integrity and confidentiality.One of the best ways for keeping sensitive data is through encryption.Companies are considering encrypting the data as a way of securing data and preventing compromise of corporate data.Encryption of data at rest and in motion usually helps in preventing data loss and eavesdropping attempts on the mobile devices (Mackey, 2003). Organizations are considering protecting data at rest with self-protecting applications that store contacts, email messages, and calendars inside encrypted containers. The containers tend to separate personal data from business data;thus, making it easy to wipe business data in case the device is stolen.
Another strategy that organizations are using as a way of ensuring data confidentiality and integrity is through authorization and authentication control.The authentication and authorization control of mobile devices help in protecting unauthorized access to the mobile devices and data in the devices (Mackey, 2003). Organizations are considering the implementation of two-factor authentication on mobile devices that require users to prove their identity by using something they know or have such a password or fingerprint.Organizations are also using the strategy of classifying users where employees require different classifications. With the attempt of ensuring security, organizations are defining which mobile device and the back-end systems that each class of employees may access so as to help in minimizing chaos (Garg, 2010).

Carolyn Morgan is the author of this paper. A senior editor at Melda Research in nursing writing services if you need a similar paper you can place your order for a custom research paper from medicine essay writing.

More About the Author

Author is associated with MeldaResearch.Com which is a global Custom Essay Writing and Term Paper Writing Company. If you would like help in Research Papers and Term Paper Help you can visit Custom Writing Service

Total Views: 194Word Count: 735See All articles From Author

Add Comment

Education Articles

1. Decoding Project Management Certifications: Pmp Or Capm?
Author: Myank

2. Best School In Rohini
Author: Sanchit Arora

3. Exploring The Foundations Of Islamic Learning: From Qur'anic Studies To Jurisprudence
Author: faizalkhan1393

4. Jain University Online Bcom
Author: Collegetour

5. Mastering Digital Marketing: Unlocking The Power Of Salesforce Marketing Cloud With Proximsoft
Author: proximsoft

6. Horizon Scholar: Your Source For Personalized University Selection Guidance
Author: Horizon Scholar

7. Advancing Knowledge: Machine Learning Research Proposal Services In Kisumu, Kenya
Author: elaine

8. A Guide To Ms In Business Analytics In Canada
Author: Shilpa Arora

9. The Psychology Of Learning: Understanding Cognitive Processes And Educational Strategies
Author: anwarkhan45314

10. Data Analytics Online Training Hyderabad | Data Analytics Training
Author: Teja

11. Curricular Innovation In Education: Adapting To The Changing Needs Of Students
Author: amankhan99101

12. The Heartbeat Of Windsor Gardens Primary School
Author: Avenues College

13. Buy Research Proposal In Nairobi, Kenya: A Comprehensive Guide
Author: elaine

14. Empowering Minds: Exploring Counseling Techniques For Personal Growth And Healing
Author: abdulshaikh5253

15. Exploring Earth's Extremes: From Antarctica To The Sahara Desert
Author: Madhu Yadav

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: