Explore BrainMass
Share

Mobile Computing: Security Risks

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

As capabilities and functionality are added to devices, the differences between PC, e-reader, smartphone, and PDA gets blurred. For the discussion below, we will rely on current trends in terminology and categorization, but recognize that as mobile hardware evolves, new categories will emerge and traditional categories will become irrelevant

At present, the benefits associated with mobile computing seem to outweigh potential security threats. However, as the number of people who engage in mobile computing increase, the likelihood that criminals will target mobile financial activity is sure to grow as well.

•What are the most common security risks associated with mobile computing?

Please use at least one reference.

© BrainMass Inc. brainmass.com October 25, 2018, 9:46 am ad1c9bdddf
https://brainmass.com/business/informatics-and-security/mobile-computing-security-risks-586215

Solution Preview

As mobile computing continues to grow, so does the need for mobile computing security. Mobile devices allow users to perform office work while at a coffee shop. Coffee shops are also work places for hackers who present great threats to the safeguarding of confidential ...

Solution Summary

As capabilities and functionality are added to devices, the differences between PC, e-reader, smartphone, and PDA gets blurred. For the discussion below, we will rely on current trends in terminology and categorization, but recognize that as mobile hardware evolves, new categories will emerge and traditional categories will become irrelevant

At present, the benefits associated with mobile computing seem to outweigh potential security threats. However, as the number of people who engage in mobile computing increase, the likelihood that criminals will target mobile financial activity is sure to grow as well.

•What are the most common security risks associated with mobile computing?

$2.19
See Also This Related BrainMass Solution

Mobile payments and internet security

Question 1

Please share your experience with online social networks. What role do you think social networks are playing in current everyday life? What societal changes are resulting from social networks? What are the pros and cons of online social networks compared to the traditional means of social interaction? Social media aggregators purport to score your overall presence on the Internet and determine just how influential you are. A good example of this is Klout.com. Focus on social media aggregation and what this means for the future. What's the long-term value of these tools? Who's interested, and why? And why might you at some point find it useful to participate in these exercises?

Question 2

Now with Microsoft having made its entry into cloud computing, it is safe to say that the cloud will be sticking around for a while. Due to the nature of the cloud and being relatively new still, it has inherent security risk. If you were a CIO/CTO, would you recommend that your organization venture into cloud computing? Why or why not? What factors you would consider to make the decision? And how you would mitigate potential security issues?

Question 3

Customer security is a serious concern for e-commerce. An e-commerce system needs to ensure that customers are indeed who they say they are, their customer information is accurate and secure, and only authorized individuals have access to the customer information. Mobile commerce is becoming very popular. Focus your discussion on mobile payment systems and associated security issues

Question 4

Edward Snowden has created huge controversies worldwide. People are not sure what to think about him. Is he a hero? A fighter for freedom of speech? Or a delusional traitor that exposed national security? Has he done the right thing to all people or a disservice to his country and fellow countrymen? What is your opinion about this and the broader issue of surveillance of the phone calls of the U.S. citizens? What does our right to privacy mean in this age of networked systems and the massive storage of the data flowing through the networked systems?

Job Type:

View Full Posting Details