Ebony S. Spann January 29, 2015 WRIT 391 Impact of Mobile Devices in Cybersecurity Critical Annotated Bibliography Wright, J., Dawson, M., & Omar, M. (2012). CYBER SECURITY AND MOBILE THREATS: THE NEED FOR ANTIVIRUS APPLICATIONS FOR SMART PHONES. Journal of Information Systems Technology & Planning, 40-60. In this journal the journalists’ discuss how smartphones are becoming a means to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber-attacks. The threats can range from Trojans and viruses to botnets and toolkits.
Networked Systems Security Task 1 – THREATS AND IMPACT OF NETWORK THREATS There are many types of threats that can damage your computer either temporarily or permanently. Some threats posed may not threaten your computer right away however have the potential to do so. Some threats that present themselves can include physical threats such as the theft of equipment whether that is the monitor, computer etc. Other threats can be harder to find such as viruses, worms or any kind of malware. Understanding these threats allows the organisation to prevent, protect and correct any damage done to his/her computer to an extent.
He can use the names or phone numbers listed in the DNS to gather more sensitive data. Internet Protocol Address range can also be of useful to the attacker. By knowing the IP range, the attacker can port scan and identify active machine on that network. Although IP address range finding is imposable to protect from hackers, there are still counter measures
This is called encryption; it’s the process of making an original message unreadable to unauthorized individuals. By encrypting the incoming and outgoing data, you are protecting the confidentiality, authenticity and integrity. This will protect your information against most intruders. If somebody has the tools to convert an encrypted message back to its original format then they might be able to read the encrypted message. Every time encrypted data is sent, the person that is receiving it has to decrypt it in order to read it.
A huge perk of having a landline phones is that it works everywhere, but cell phones don’t always work whether it be because of coverage issues or other problems. Owners of a house that has a metal roof will never replace their landline with a cell phone because the cell phone won't work inside their house. The metal seems to block the signals. Landline phones work everywhere, but cell phones have their limits. Cell phone batteries need to be kept charged up.
With many network client devices, this results in the detected network displaying as an unnamed network and the user would need to manually enter the correct SSID to connect to the network. Unfortunately, turning off the broadcast of the SSID may lead to a false sense of security. The method discourages only casual wireless snooping, but does not stop a person trying to attack the network. It is not secure against determined crackers, because every time someone connects to the network, the SSID is transmitted in clear text even if the wireless connection is otherwise encrypted. An eavesdropper can passively sniff the wireless traffic on that network undetected and wait for someone to connect, revealing the SSID.
Name Institution Course Instructor Date: Wireless network plan Introduction Wireless services are in demand in business application and large corporate. This is as a result of their agility, differentiation and higher bandwidth to the users in the organization. Wireless devices require security to ensure that information passed over the network is secure. There are different challenges that affect the wireless network such as operation, building and design of the mobility solution. One application wireless network is learning institutions such as colleges.
Unit 1 Assignment 1: Voice vs Data Cell Phones: Cell phones are a part of our everyday lives depending who you ask. The technology for them have come leaps and bounds that what anyone could imagine. Cell phones use to use a voice network only collecting waves from towers to transfer their voice communication. Sending one signal out and receiving one signal in. Now, though cell phones use both voice and data for their networks and it has been ongoing competition since then between carriers.
Technology and Communication Vanessa Rodriguez CJA/304 February 5, 2013 Timothy J. Anderson Abstract There are so many ways to communicate and to find information with technology, it’s amazing! The gadgets and the machinery used in the government or for the government services makes it a whole lot more easy for the people that need to search for data. Some are mobile which makes it convenient for those that are constantly moving around. Then there’s the technology that is used in offices which has endless ways to communicate, or to investigate useful data. In this essay I will communicate about Automated fingerprint identification system and mobile data terminal; the positive and negative effects of new technologies
Jonathan Aldana English I, Period 6 Mrs. Gassaway March 5, 2015 Is The Government Really Protecting Us? How would you feel that the Government has access to your phone’s apps such as, Instagram, Twitter, and Facebook account(s)? Well you would probably be very concerned because, your personal information should only be shared if wanted too. NSA Spying should not be allowed because, it gives access your cellphone’s personal and private information through camera and/or microphone, allows the use of surveillance vans and drones in our neighborhood, and abuse of power. NSA Spying should not be allowed because your personal and private information should be shared only if wanted too and it gives access to things the Government are not