Critical Annotated Bibliography

2421 Words10 Pages
Ebony S. Spann January 29, 2015 WRIT 391 Impact of Mobile Devices in Cybersecurity Critical Annotated Bibliography Wright, J., Dawson, M., & Omar, M. (2012). CYBER SECURITY AND MOBILE THREATS: THE NEED FOR ANTIVIRUS APPLICATIONS FOR SMART PHONES. Journal of Information Systems Technology & Planning, 40-60. In this journal the journalists’ discuss how smartphones are becoming a means to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber-attacks. The threats can range from Trojans and viruses to botnets and toolkits. According the journalists 96% of smartphones do not have pre-installed security software, which give attackers…show more content…
In this journal, Drew discuss the goals of IT security to protect the use of mobile devices in CPA firms and other businesses. His article outlines cybersecurity threats on the mobile and cloud fronts and lists steps that accounting firms, individuals CPAs, and other can take to reduce their risk of suffering a devastating data breach. Drew discusses how the rate of smartphones and tablets sales increase and how it reached 144.4 million units in the first quarter. With the growth of smartphones and tablet increasing, the risk of malicious software have increased. “One of the biggest risks involves employees or executives downloading personally identifying or confidential client information to their personal smartphones or tablets”. If one of those devices was lost or stolen, critical data can be compromised if it falls in the wrong…show more content…
Since confidentiality is an issue, smartphone transmissions signals can be hacked by accidental broadcast. Third party snooping, can hack blue tooth signals that transmit confidential information. Stolen phones create a threat to business and the community through fraud. Training employees can be a measure to minimize the risks that poses a threat to cell phones. Some measures to help in information security could be aimed to data encryption, passwords, software, network security solutions and service companies offering voice encryption. Companies provide devices to the employees with a confidentiality policy on the use of such devices and the capability to store information. As competition grows confidentiality with company's data could create loss of confidentiality if data becomes compromised. Total security is not possible, only adoption of measures can prevent attacks on devices to protect information. The user is the greatest security treat, users lack common
Open Document