Annotated Bibliography on the Impacts of Mobile Devices on Cyber Security

Arabo, A., & Pranggono, B. (2013, May). Mobile malware and smart device security: Trends, challenges and solutions. In 2013 19th International Conference on Control Systems and Computer Science (pp. 526-531).IEEE

The article discusses a research that was carried out on the trends and challenges of cybersecurity on mobile devices and specifically the smartphones. The authors examine the increasing demand for connectivity through metered and wireless networks in order to access social networks and the internet in general. The article also acknowledges that due to the increase in the use of mobile devices over the past decade, there have been more threats to the security of the users’ information and this has led to the demand for effective cybersecurity. According to the authors, mobile malware is considered a key risk facing mobile devices’ access to social networks. Moreover, the impact of cybersecurity on mobile devices is assessed and the available interventions to curb the problem are also discussed. The authors comprehensively examine the challenges that the mobile users face in accessing the social sites and the internet due to their vulnerability to cyber-attacks. They also advise the users of mobile devices to implement the various available applications to safeguard their information when they access the internet. This is an enlightening article as it discusses the possible solutions and effects of cyber security on mobile devices; and therefore, it can be used to shed more light on the impacts of mobile devices on cybersecurity.

Bell, R. (2015). Digital steganography: Its impact on mobile forensics, hacking, and social media (Doctoral dissertation, UTICA COLLEGE).

In his article, Bell assesses the impacts of mobile forensics, social media, and hacking. The author identifies digital steganography as the most recent developments in the realm of cybersecurity that makes encryption of sensitive user data possible. The software, referred to as steganography, conceals important messages, conversations, emails, and data from other unauthorized users in order to safeguard the user information. Bell posits that this application can operate in any operating system of both mobile phones and computers as a cybersecurity firewall. The application has the ability to conceal malicious malware into harmless files such as email attachments, audio, or even video files. Additionally, the article provides comprehensive evidence of extensive research on digital steganography effects on mobile forensic, the approaches used by hackers to steal user information, and the crucial role of installing the application as a cybersecurity system in the social networks. Since the article recommends the importance of using applications, such as steganography to prevent cyber attacks on mobile devices, it can be used as a reliable source of information as far as the impacts of mobile devices on cybersecurity is concerned.

Bertino, E. (2016). Security Threats: Protecting the New Cyber frontier. Computer, 49(6), 11-14.

In this article, the author argues that as dependence on information and communication technology keeps increasing every year and cyber attacks become more advances, cybersecurity is equally becoming more challenging and critical than ever. Also, Bertino states that the new threats, especially on mobile devices demand new defensive mechanisms. In her perception, the advancements in information and communication technology have resulted in the discovery of smartphones, cloud computing, data analytics, and social networks. Due to these innovations, there has been an upsurge in the processing of data leading to the expansion of data processing, storage, and collection. The article further examines the new cyber frontiers being utilized by organizations to safeguard their information and limiting user access to sensitive and valuable information. The author states that numerous companies currently possess BYOD, which enables their employees to use their mobile devices to perform work-related duties. Moreover, she discusses other software vulnerabilities and how the loopholes can be sealed utilizing metamorphic testing. Based on the insightful view provided by the article regarding the issue of cybersecurity and mobile devices, it is plausible to affirm that the material can be used as a reliable source of secondary data in the research.

Dye, S. M., & Scarfone, K. (2014).A standard for developing secure mobile applications. Computer Standards & Interfaces, 36(3), 524-530.

The authors, Dye and Scarfone, are cyber security and mobile application security experts who are conversant and experienced on matters concerning cybersecurity and the defense systems for mobile application securities. Their article analyses the standards for establishing safe mobile applications that are not prone to cyber-attacks. The article begins by elaborating that the increase in mobile device security challenges arises from the development of numerous mobile software applications that exposes the users to attacks from hackers. Mostly, these applications are developed by amateur programmers who have no knowledge or experience on how to secure their applications. Such applications, as the author state, exposes the users’ information to a possible security breach. Moreover, the article explores the best practices that should be utilized by application developers to improve the cybersecurity of mobile devices. This article is a credible source of reliable information owing to the knowledge and experience of the authors.

Gelenbe, E., Görbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M., &Lyberopoulos, G. (2013). NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem. In Information Sciences and Systems 2013 (pp. 369-378). Springer International Publishing.

Gelenbe et al. analyses advanced network security in order to create the provision of seamless services in the mobile network. Due to the increase in popularity of the use of mobile devices, hackers are increasingly using the loopholes to install malware that tap user private information as well as exploiting the mobile device user vulnerabilities. According to the authors, mobile devices are constantly being used to launch large-scale cyber-attacks. The article proposes the NEMESEYS project as a design that is developed to mitigate the increasing use of mobile devices in conducting cyber attacks. The design first identifies and understands the threat settings, then it evaluates the nature of the attack targeting the mobile device network before finally determining the necessary measures to be implemented. This article identifies the methodologies that cyber attackers employ to obtain private user information. The main point discussed in the article is the NEMESEYS project, which develops data collection infrastructure that safeguards mobile devices by providing early warnings for the detection of a threat.

 

 

 

Calculate your order
Pages (275 words)
Standard price: $0.00
Open chat
1
towriteessays.com
Hello 👋
Thank you for choosing our assignment help service!
How can I help you?