Share
Explore BrainMass

Mobile Computing: Security Risks

As capabilities and functionality are added to devices, the differences between PC, e-reader, smartphone, and PDA gets blurred. For the discussion below, we will rely on current trends in terminology and categorization, but recognize that as mobile hardware evolves, new categories will emerge and traditional categories will become irrelevant

At present, the benefits associated with mobile computing seem to outweigh potential security threats. However, as the number of people who engage in mobile computing increase, the likelihood that criminals will target mobile financial activity is sure to grow as well.

•What are the most common security risks associated with mobile computing?

Please use at least one reference.

Solution Preview

As mobile computing continues to grow, so does the need for mobile computing security. Mobile devices allow users to perform office work while at a coffee shop. Coffee shops are also work places for hackers who present great threats to the safeguarding of confidential ...

Solution Summary

As capabilities and functionality are added to devices, the differences between PC, e-reader, smartphone, and PDA gets blurred. For the discussion below, we will rely on current trends in terminology and categorization, but recognize that as mobile hardware evolves, new categories will emerge and traditional categories will become irrelevant

At present, the benefits associated with mobile computing seem to outweigh potential security threats. However, as the number of people who engage in mobile computing increase, the likelihood that criminals will target mobile financial activity is sure to grow as well.

•What are the most common security risks associated with mobile computing?

$2.19