230 likes | 973 Views
BY: JEROME +SHADY+. IT TECHNOLOGIES. MOBILE SECURITY. MOBILE SECURITY. Mobile devices can be both the instruments and victims of privacy violations. Google’s latest innovation, Google Glass, has been pre- emptively banned at a diner in Seattle due to
E N D
BY: JEROME +SHADY+ IT TECHNOLOGIES
MOBILE SECURITY Mobile devices can be both the instruments and victims of privacy violations. Google’s latest innovation, Google Glass, has been pre-emptively banned at a diner in Seattle due to the security implications of an unobtrusive
mobile device capable of discreetly recording audio, video and still footage in public and private places. However, most security threats from mobile devices result from the manner in which the consumer uses the technology
Users may unknowingly download malware disguised as a useful application.Out-of-date operating systems may pose threats. OS manufacturers periodically release security patches and fixes, but it is up to the consumer to update their devices.
Older devices may not support new updates to the OS. Out-of-date software presents similar security risks. Attackers can exploit vulnerabilities in outdated software. Wireless transmissions are not always encrypted, making
information sent via mobile devices easier to intercept. With users treating their devices in such a blasé fashion, it can be difficult and frustrating for IT specialists to help users avoid security
and privacy mishaps—especially when those devices are used for company purposes. With users treating their devices in such a blasé fashion, it can be difficult and frustrating for IT
specialists to help users avoid security and privacy mishaps—especially when those devices are used for company purposes. Mobile security or mobile phone security has become increasingly
important in mobile computing. It is of particular concern as it relates to the security of personal information now stored on smart phones.