assessmentwk4

.docx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

110

Subject

Information Systems

Date

May 14, 2024

Type

docx

Pages

2

Uploaded by CountLemurPerson1025 on coursehero.com

CYB/110 Week 4 Assessment Ellen Williams 04/15/2024 Smartphones have transformed our society since their invention. Their popularity and loose security measures have made them vulnerable to hackers. Attacks have increased through the years, but the development of security measures has been slow. Most phones store very sensitive data like credit cards or banking information. One of the top issues with mobile security is losing or having a phone stolen. This causes information to fall into the wrong hands. There is also the potential for data leaks for mobile devices. There are many threats and security risks against a mobile device. The threat of eavesdropping is when phone calls or messages are intercepted in real-time. Phones can be stolen or lost. Malicious users can also gain access to login details for a user’s email, apps, and other networks by hacking a smartphone. Users not updating their phones or apps may cause vulnerabilities that hackers can use to gain entry. Mobile phones also lack proper firewalls. These vulnerabilities open smartphones up to its biggest threat, malware. Applications can also cause vulnerabilities through insecure data storage or improper authorization systems. Hackers can also gain access through Bluetooth devices. Certain procedures can be done to help lower the possibility of vulnerabilities. Keeping a phone’s operating system and applications regularly updated will help decrease vulnerabilities that may have existed with previous systems. To keep a phone safe from Bluetooth attacks, a user should set a security PIN for any paired device, regularly update devices, not pair in a public location, and not accept unknown Bluetooth messages. Keeping a phone on auto-lock will help to feather unwanted access, another step is to install a two-step verification process with not only a password but also biometric security. If the phone does end up in the wrong hands, this will help to block access. To add an extra level of security, a user should also encrypt their phone. Regularly backing up data to a separate location will help in retrieving data in the event of theft or loss. iPhones offer the cloud as a backup solution for data while Androids backup to Google servers.
Knowing a wide range of security measures will help to lower vulnerabilities in the workplace. Keeping my devices on auto-lock and regularly changing my passwords will be one of the top procedures I will use in the future. Having properly secure passwords will help mitigate unwanted access. Encryption will help with keeping my data safe in the event of a breach, loss, or theft. I will also regularly update not only my devices, but any applications added. To keep from losing data, I will regularly have my devices backed up. Using these security measures will help to eliminate most vulnerabilities but there will always be a threat. It will be harder to lose or have my data stolen.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help