123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

Mobile Computing Security

By Author: sherry roberts
Total Articles: 573

Abstract
Mobile computing refers to any means of using a computer while outside the corporate office.It includes working from home, road, airport, or a hotel. When organizations go mobile, there tend to be essential considerations beyond cost and getting managers, employees, and stakeholders on board. All mobile platforms are usually at risk, and there are many security threats in relation to mobile computing.The attack usually put data at risk from different fronts; thus, requiring a new force in network security. Mobile computing tends to cause some threats to the user and the corporate environment.
Trends organizations face with mobile computing security
Mobile computing is the ability to communicate and computing while, on the move.Mobile computing tends to eradicate the need for confinement within one physical location. With the increase in mobile computing, organizations are now finding important to address how to provide the best balance of convenience and security (Ladan, 2013). With the increase in the number of mobile users, there is an alarming increase in mobile threats. Organizations should focus more attention on data loss prevention because of the increasing number of security breaches. As mobile computing continues to increase, organizations are considering important measures so as to protect data in transit and data at rest (Talukdar, 2010). Data at rest is data stored on a device while data in transit is the way information flow over a network.
An issue that organizations face with mobile computing security is unauthorized access. Users tend to be stealing login credentials for the applications on their mobile devices; thus, making access to corporate resources a click or tap away. With this possibility, unauthorized users tend to have easy access to corporate accounts and applications, social media and many more. Another issue organizations are facing as a result of mobile computing security, is loss and theft (Talukdar, 2010). Users of the mobile devices usually store a significant amount of very sensitive corporate data on their mobile devices. These data can include customer databases, business email, corporate presentation, and business plans. In such a situation, it will only take a hurried user to leave their device in a taxicab for significant data loss to occur.Another trend in mobile computing security is malware detection. The way that attackers can infiltrate continues to be expanding, and it is becoming very easy to infect networks and devices without the organization noticing (Ladan, 2013). Most organizations are facing this problem, and mobile malware is capable of stealing sensitive data, collect user data, and rack up long distance phone charges.It is also possible for attackers to use mobile malware in performing targeted attacks against the mobile device users.
Steps to ensure data confidentiality and integrity
Protecting the data means protecting its integrity,confidentiality, and availability.Failure to protect data can result to legal liability,loss of company goodwill, and business losses. In order to protect data, organizations have been considering various steps to ensure data integrity and confidentiality.One of the best ways for keeping sensitive data is through encryption.Companies are considering encrypting the data as a way of securing data and preventing compromise of corporate data.Encryption of data at rest and in motion usually helps in preventing data loss and eavesdropping attempts on the mobile devices (Mackey, 2003). Organizations are considering protecting data at rest with self-protecting applications that store contacts, email messages, and calendars inside encrypted containers. The containers tend to separate personal data from business data;thus, making it easy to wipe business data in case the device is stolen.
Another strategy that organizations are using as a way of ensuring data confidentiality and integrity is through authorization and authentication control.The authentication and authorization control of mobile devices help in protecting unauthorized access to the mobile devices and data in the devices (Mackey, 2003). Organizations are considering the implementation of two-factor authentication on mobile devices that require users to prove their identity by using something they know or have such a password or fingerprint.Organizations are also using the strategy of classifying users where employees require different classifications. With the attempt of ensuring security, organizations are defining which mobile device and the back-end systems that each class of employees may access so as to help in minimizing chaos (Garg, 2010).

Carolyn Morgan is the author of this paper. A senior editor at Melda Research in nursing writing services if you need a similar paper you can place your order for a custom research paper from medicine essay writing.

More About the Author

Author is associated with MeldaResearch.Com which is a global Custom Essay Writing and Term Paper Writing Company. If you would like help in Research Papers and Term Paper Help you can visit Custom Writing Service

Total Views: 7Word Count: 735See All articles From Author

Education Articles

1. Does Management Study Helps To Grow The Management Skills
Author: Girija Nandi

2. Things To Consider Before Choosing An Mba Programme
Author: Divya Sharma

3. Having Trouble Dealing With Your Projects? - Get Assignment Help!
Author: Having trouble dealing with your Projects?

4. What Are The New Highlights Of Selenium 4
Author: Infocampus

5. Innovative Approaches To Improve Your Civil Services
Author: Somnath Ranjan

6. Approach To Teaching Life Skills To Students
Author: Gurukul The School

7. Know Why Should You Enrol In Robotics Classes And What Are The Aspects?
Author: Ankur Anand

8. Is Assignment Help Need Of The Hour??
Author: quick and wonderful assignment help

9. The Teacher-student Relationship That Must Exist In The Classrooms
Author: Alpine Convent School

10. Enabling Children To Widen Their Intellectual Boundaries
Author: Gurukul The School

11. Data Science Training In Hyderabad
Author: Sumanth

12. Discipline Policy At Gurukul Towards Creating An Environment Of Collaboration
Author: Gurukul The School

13. Upcoming Government/private Jobs
Author: gurujobalert

14. A Few Tips To Master Foreign Languages
Author: Ashley Baker

15. Top 3 Optional Subjects For Upsc Mains
Author: Rahul Sharma

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: