Wednesday, April 24, 2019
Cause-Effect Analysis Essay Example | Topics and Well Written Essays - 1000 words
Cause-Effect Analysis - strive ExampleMobile devices possess vulnerabilities that make them attractive and easy targets for exploitation.The first major cyber threat to meandering(a) devices stems from the size and portability nature of these devices. Since these devices contain sensitive and large volumes of information, theft or loss of a brisk device can be a major problem to the user. These devices are packed with volumes of information relate to the owner of the device. Unfortunately, people accidentally leave these devices in cars, airplanes and hotels (National electronic computer Board, 2011). In addition, it is easy for such devices to be stolen from unrivalleds bag or pocket, especially in crowded places. If the device ends up the reach of flagitiouss, critical information such as bank account numbers, emails, passwords and PINs can be accessed (US-CERT, 2010). With such information, the criminal is in a position to carry out various activities without the knowledge of the user. For example, the criminal may expatriation a given sum of money from the victims account within a shortstop period of time. Due to the portable nature and size of these devices, they can easily be misplaced or stolen.The loss of the device is not the only threat to these devices. Mobile devices are vulnerable to malware in comparable ways to desktop computers. There are specific malware that have been targeted to these devices. These are normally transmitted when one downloads applications that contain malware. In many cases, mobile malware is contained in most of the applications available for free on the internet, and these usually masquerade as security software of games. For instance, in a paper by the US Computer Emergency Readiness Team (US-CERT) (2010), the malware known as Ikee.B is discussed. These malware is an iPhone worm that is able to search and forward pecuniary information that is stored on iPhones. Therefore, as the example shows, malware can also be used to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.