It Has Been Said That a Smartphone Is “a Microcomputer in Your Hand.” Discuss the Security Implications of This Statement. Most People Are Unaware That Their Cell Phones Are Just as Vulnerable to Cyber Attacks as Their

In: Computers and Technology

Submitted By JOEAWUKU
Words 2351
Pages 10
Case Study One
Read the following case and answer questions below.
How Secure Is Your Smartphone?
Have you ever purchased antivirus software for your iPhone, Android, or cell phone? Probably not. Many users believe that their iPhones and Androids are unlikely to be hacked into because they think Apple and Google are protecting them from malware apps, and that the carriers like Verizon and AT&T can keep the cellphone network clean from malware just as they do the land phone line system. (Telephone systems are “closed” and therefore not subject to the kinds of the attacks that occur on the open Internet.)
Phishing is also a growing smartphone problem. Mobile users are believed to be three times more likely to fall for scams luring them to bogus Web sites where they reveal personal data: Why? Because mobile devices are activated all the time, and small-screen formatting makes the fraud more difficult to detect.
So far there has not been a major smartphone hack resulting in millions of dollars in losses, or the breach of millions of credit cards, or the breach of national security. But with 74 million smartphone users in the United States, 91 million people accessing the Internet from mobile devices, business firms increasingly switching their employees to the mobile platform, consumers using their phones for financial transactions and even paying bills, the size and richness of the smartphone target for hackers is growing.
In December 2010, one of the first Android botnets, called “Gemini,” was discovered. The code was wrapped inside a legitimate Android app whose developers did not realize they were spreading malware. IPhones worldwide were hacked by a worm called “Rick Roll” used to create a botnet for stealing online banking information. In March 2011, Google discovered a botnet called DroidDream, code for which was found in 50 infected apps. Apple iPhones had a…...

Similar Documents

Cyber Attack

...Cyber Attack University of Phoenix Martese, Daniel, Terrence and Joe May 13, 2012 Mr. Thomas A. Maricle Introduction Cyber-attack is an attempt to undermine or compromise the function of a computer-based system, or attempt to track the online movements of individuals without their permission. These types of attacks can be undetected to the user and/or network administrator. Prevention At the time of this article writing, 86% of all attacks were aimed at home users. This article is from 2006, most likely the percentage is higher now. The article states that the home user does not take control and utilize their home firewall or antivirus software. To this end, I agree because most of my users that I have helped never opened their firewall or even heard of anti-virus. The author makes note what the difference between a detection and prevention system is. Prevention systems automatically detect and block malicious network and application traffic, while allowing legitimate traffic to continue through to its destination. A detection system just detects and would rely on the prevention system to act on it. The prevention system is said to block bad malevolent code and cannot block good code at the same time, while allowing for protection of newer and more advanced types of security threats. The users should get to know what...

Words: 496 - Pages: 2

Cyber Attack Prevention

...Cyber-Attack Prevention As cyber-criminals become cleverer with the cybercrimes, more and more individuals are in danger of a cyber-attack. The threats become more intense and damaging as technology grows. Often times, home users think computing and surfing the Internet is safe when at home. It is a necessity to be aware of the prevention methods whether at home or at work. To further the comprehension of cyber-attack prevention, an article is chosen and an evaluation is the article. The evaluation of an article will include a stance on the quality of the material, selections of various aspects, descriptions of each aspect, reasons for an individual viewpoint, and an example. Article Summary Home users need to practice prevention methods when using the Internet at home. Cyber-criminals’ methods and targets have evolved (Damico, 2009). Several home users may not be aware that any connection to a network is networked activity and requires some measure of protection. According to the Damico (2009) article, a prevention system must identify and stop malicious attacks before they do damage and have a chance to infect a system. It is not only imperative to use prevention methods, but also it is imperative to understand prevention methods. Technology prevention methods will no longer be adequate to protect against the modern cyber-criminals of today. Material Quality The quality of the material is credible. The article is valid. The author uses more than one in-text...

Words: 722 - Pages: 3

Cell Phone Usage

...Jordan Singleton Disadvantages Of Using Cell Phones In Class Many students are preoccupied with their smart phones during class. Little do they know that it is not a smart thing to do during class. There are many effects in using them during class. First, I am going to talk about the academic performance on students who use cell phones during class. While your instructor is teaching, students may think its boring, so they pull out their cell phones and text or play games. A instructor may be boring , but they are teaching you for a reason. That lowers students academic performance. Students should either wait til after class and mess with their phones, or turn cell phones off. A cell phone may help you, but your academic performance is more important than a phone. Another effect on cell phones is that it is a distraction. Students lose focus. If a phone goes off in class, everybody’s first reaction is to look around and see who’s phone it is. Just like texting, they are not paying attention to the material being taught. The third issue is students can cheat on assignments by using cell phones. Different ways students cheat by using their cell phones, they store information on the phone to look at during test, taking pictures of the test to send friends, and searching the internet for answers during a test. The bottom line is cheating is cheating regardless of the method. Schools have policies well-known to students about cheating. Suspension or expulsion may be the......

Words: 295 - Pages: 2

Cell Phone

... merging the two companies”(para. 3). This venture is still in the talks but the possibility of the merge is highly anticipated. Sustainability Verizon is proven to be sustainability driven in recent years and incorporating sustainability efforts has made a huge difference. Verizon is managing carbon emissions, using solar panels for buildings, and even using alternate energy for cell phone towers. Furthermore, Verizon is also continuously trying new methods of reducing its packaging on products such as cell phones and accessories. Another productive sustainability venture is recycling cell phones and cell phone batteries. Many store locations have drop boxes where you can leave and old phone or even the opportunity to mail it back to them. Government Policies and Regulations Looking at Verizon as an entire corporation it has many policies and regulations that are enforced by not only the federal government but each individual state. Our federal and state laws give corporations such as Verizon certain policies that it must abide by and if not they could be penalized for their actions. The current federal policies are in place to keep competition as equal as it can be so a monopoly is not formed in an industry. Many regulations tend to inhibit economic growth because it inhibits entrepreneurial activities even though they are not trying to do so. Since Verizon is a company that is spread throughout the United States it also abides by state regulations that can......

Words: 1546 - Pages: 7

Developing Your Most Appreciable Asset: People

...DEVELOPING YOUR MOST APPRECIABLE ASSET: PEOPLE __________________ A Paper Presented to C. Paul King Liberty Baptist Theological Seminary __________________ In Partial Fulfillment of the Requirements for the Course CLED 510-D04 LUO _________________ By XXXX XXX XXX DEVELOPING YOUR MOST APPRECIABLE ASSET: PEOPLE Introduction This paper will analyze the development of people as an appreciable asset This analysis will cover the principles for people development, successful people developers that make the right assumption about people and those that give the right assistance to people, and the topic of asking the right questions about people. This essay will conclude with a reflection on the overall meaning of this topic as it is applicable to a leader. Principles For People Development As a leader, people are the most appreciable asset and therefore their development is essential in achieving success for the implementation of goals and the overall health of an organization. John C. Maxwell writes in his book Developing The Leader Within You that “The more people you develop, the greater the extent of your dreams. ” This statement emphasizes the contribution and value that the people of an organization have and are. There are several principles that Maxwell identifies that assists in developing people and as such these principles are directly related to the success of the leader. Initially, the leader must recognize the value of...

Words: 957 - Pages: 4

Cyber Security

...United States Cyber Command is most active commands in the military in recent days. It was established in 2009, it became operational in October 31, 2010. Cyber command (CYBERCOM) carries responsibilities to secure all website under military and can be authorized via executive order either defend or proceed to attack the attacker during the cyber-attack. CYBERCOM provides support to us forces to carry out their missions around the world, and provides defense against the cyber-attack. It enables the DOD capabilities in cyberspace, provides assurance for a reliable information network and strengthens DoD capability to defend cyber threats. The command also works closely with interagency and international partners in executing these critical missions For now, the Department of Defense and CYBERCOM can only focus on what they can control—bolstering capabilities and clearing up internal gray areas. The rules of engagement, when they’re finished, will make roles and responses to threats clearer. And CYBERCOM is in line for an $800 million budget boost—up to $4.7 billion—in the 2014 DOD budget released in April. The extra funds are aimed at increasing offensive capabilities, like disabling enemy computer systems during a conflict. “We like to laugh that government doesn’t make decisions very fast and has trouble operating at network speed, but there are reasons for that,” Lynn said. “You are considering the diplomatic impacts, the presidential impacts. What about collateral......

Words: 273 - Pages: 2

Cell Phone

...Cell phone The world of technology has been moving faster and faster. Now, instead of waiting any hours to cook a meal, we can put it in the microwave for a few minutes and the taste will be the same. Similarly, as time goes on, cell phones have been continuously developing from simple device which can just make a call too much more complicated many options such as text messaging, internet processing and sending e-mail. Now, people have chance to contact each other anywhere and at any time. As with any technology that rapidly changes our lives, cell phones have brought both advantages and disadvantages. Cell phones have some negative effects for example, some teenagers become addicted to them and they can cause accidents if used while driving. On the other hand, cell phones also have positive effects such as saving lives in dangerous situations. Some teenagers become addicted to cell phone. The main purpose that we used cell phones in the past was to communicate with someone else who was far away. Because technology has arisen, teenagers now have many choices of ways to contact her relatives and friends both far and near. Texting messages have become a specially popular and some teenagers spend many hours texting. For example, Julie Zingeser, a teen in Rock land has become addicted to text messaging. She sends text all the time when she is at home, school, doing homework and even in bed. The only time she doesn’t text is while she takes showers and plays sports. The total...

Words: 847 - Pages: 4

The Uk Cyber Security Strategy - Written Ministerial Statement

...WRITTEN MINISTERIAL STATEMENT CABINET OFFICE 25 November 2011 Minister for the Cabinet Office and Paymaster General: The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World ______________________________________________________________________ Francis Maude I have today published the new Cyber Security Strategy for the United Kingdom. I have placed a copy in the Library. The growth of the internet has transformed our everyday lives. But with greater openness, interconnection and dependency comes greater vulnerability. The threat to our national security from cyber attacks is real and growing. Organised criminals, terrorists, hostile states, and ‘hacktivists’ are all seeking to exploit cyber space to their own ends. This Government has moved swiftly to tackle the growing danger posed by cyber attacks. Our National Security Strategy published last year classed cyber security as one of our top priorities alongside international terrorism, international military crises and natural disasters. To support the implementation of our objectives we have committed new funding of £650m over four years for a transformative National Cyber Security Programme (NCSP) to strengthen the UK’s cyber capabilities. The new Cyber Security Strategy we have published today sets out how the UK will tackle cyber threats to promote economic growth and to protect our nation’s security and our way of life. One of our key aims is to make the UK one of the most secure places in...

Words: 930 - Pages: 4

Cyber Attack

...Abstract Failing to communicate and collaborate in crisis or emergency situation will undoubtedly increase the vulnerability of an organization toward potential crisis. This paper highlights the significance of effective communication and collaboration at different levels in the event of or during a crisis. This is a case of a cyberattack against Sony Pictures Entertainment once on December 3, 2014 and another attach on December 8, 2014 was considered for the purpose of this research. These cyberattack shows how techniques are not just a strategic weapon to bring down societies or to terrorize societies. But it shows that attackers are getting increasingly comfortable with using cyberattacks and can quite easily gain access to consumer personal information, business information, and employee information and can bring a company to its knees. The recent attacks not only on Sony but also Home Depot, Target and others are raising concerns. What needs to be done? The attacks are becoming more frequent, more invasive and the attackers are being bold. Should there be collaboration between businesses to combat the rising issues? Will this change the way that others businesses work together? What role does the government have in protecting citizens and their right to privacy especially from foreign attackers? These issues are significant as they underline the element of crisis communication and collaboration. Introduction In the face of increasing business demands...

Words: 1827 - Pages: 8

It Has Been Said That the Management Task Is Akin to the Process of ‘Releasing the Energy of the Atom for Constructive Human Ends’… Critically Discuss This Statement with Reference to Relevant Theory and Research.

...Motivation: It has been said that the management task is akin to the process of ‘releasing the energy of the atom for constructive human ends’… Critically discuss this statement with reference to relevant theory and research. 1. Introduction Motivation in administration portrays routes in which administrators advance benefit in their representatives. Regularly, individuals confound the thought of "upbeat" representatives with "roused" workers. These may be connected, yet inspiration really portrays the level of longing workers feel to perform, paying little mind to the level of bliss. Representatives who are satisfactorily persuaded to perform will be more gainful, more connected with and feel more put resources into their work. At the point when representatives feel these things, it helps them, and consequently their chiefs, be more fruitful. The definition for the statement ‘releasing the energy of the atom for constructive human ends’ means motivation is viewed as the most imperative and the most troublesome capacity in the administration process. No other administration capacity including arranging, choice making, authoritative conduct or controlling pulled in that much attention It is a head's business to goad specialists to complete their occupations well. So how do executives do this? The answer is inspiration in organization, the technique through which administrators urge delegates to be beneficial and convincing. Motivation is a complex sensation. A...

Words: 4139 - Pages: 17

Cyber Security: Cyber Terrorism

... activities are in most cases politically motivated and the main of these secret operatives is to cause physical or psychological fear among the members of the public who are not armed. Problem definition There have been a lot of arguments concerning the presence of cyber terrorism and if these computer attacks are worth to be considered as terrorist attacks. Weimann (2004) indicates that cyber terrorism is an aspect that has been created by the media and politicians. Weimann (2004) argues that although there is the existence of cyber insecurity but to classify certain attacks on networks as terrorism is a populist move. This research therefore dwells on discerning the existence of cyber terrorism and how it is different from other forms of cyber attacks. Findings Cyber terrorism is a major concern with the Information technology sector. The increased synonyms that are associated with this subject are a clear representation of increased concern towards this subject. There are some researches that refer to this subject as either cyber harassment or cyber disruption. These varied synonyms are an indication that there has been more concern from the media and politicians over this subject. Talihärm (2010) indicates that increased activity towards cyber terrorism may lead to a myriad of information but this information could mislead the general public and stakeholders such as the Homeland Security. Weimann (2004) argues that cyber terrorism has been embraced by opportunistic...

Words: 1810 - Pages: 8

Cell Phone

..., notice how every letter has the same width, even i and m. Every embedded font will automatically be embedded in the output ebook during conversion. Paragraph level formatting You can do crazy things with paragraphs, if the urge strikes you. For instance this paragraph is right aligned and has a right border. It has also been given a light gray background. For the lovers of poetry amongst you, paragraphs with hanging indents, like this often come in handy. You can use hanging indents to ensure that a line of poetry retains its individual identity as a line even when the screen is too narrow to display it as a single line. Not only does this paragraph have a hanging indent, it is also has an extra top margin, setting it apart from the preceding paragraph. Tables ITEM | NEEDED | Books | 1 | Pens | 3 | Pencils | 2 | Highlighter | 2 colors | Scissors | 1 pair | Tables in Word can vary from the extremely simple to the extremely complex. calibre tries to do its best when converting tables. While you may run into trouble with the occasional table, the vast majority of common cases should be converted very well, as demonstrated in this section. Note that for optimum results, when creating tables in Word, you should set their widths using percentages, rather than absolute units. To the left of this paragraph is a floating two column table with a nice green border and header row. Now let’s look at a fancier table—one with alternating row colors and partial borders...

Words: 1614 - Pages: 7

The Most Favorable Smartphone

...TITLE – THE MOST FAVORABLE ABSTRACT The number of smartphone users worldwide will surpass 2 billion in 2016, according to new figures from eMarketer—after nearly getting there in 2015. Next year, there will be over 1.91 billion smartphone users across the globe, a figure that will increase another 12.6% to near 2.16 billion in 2016. This shows that smartphone is becoming a necessity because smartphone helps a person multi-tasking through the day. For example, using smartphone for phone call, message, social network. Nowadays, the inventor tries to figure out for new invention for human satisfactions and needs. Recent invention is making graphic card that can runs computer games smooth from your phone without over-power consumption and battery burn. * Cita pasal invention aluminium ion battery. INTRODUCTION We are researching about the most favorable smartphone among university students around Kuala Lumpur. It is because we wanted to find the most favorable smartphone criteria by doing survey. The survey we create by using google form. We have conduct the survey last week from Sunday to Friday through social network platforms like Facebook. We are using online survey because it helps us reduce cost and time. The survey was taken by some student from many universities such as GMI, UNIKL MESTECT, CUCMS, UIA and many more. This research outcome will help us find the idea to create a smartphone concept that meet all the favorite criteria. OBJECTIVE To study the most......

Words: 260 - Pages: 2

Cyber Security

... governmental organizations that are foderally protected and com promising the national security of many countries.Thus, the government has been forced to set policies, procedures and cc11 practices to lessen the chance ofconsumcrs ain being vulnera ble to any attacks. but they do not seem to be enough . With the memory of the terrorist attacks of Septem ber I I becoming ever more distant.congress passing another piece of homela nd security legislation seems to be more and more of a distant t hought as well. Unfortunately, there has been little support for taking on yet another major piece of com plex and costly homeland securi ty legislation. The government's options are steadily becoming limited and they must act to increase and enha nce their cyber security protection measurements to ensw-e a cyber attack will not happen. Another issue ofJelevance pe11ains lo the cyber-criminal ability lo allack power grids. If a cyber-criminal were able lo hack a power grid it would cause detrimental problems for the l'cderal government and the American people including but not limited to blackouts, encryption errors, and a total system meltdown . Privates indust ry is a nother sector that has been getti ng l1 hard in cyber it criminal activity.The private industry has accounted for al least 65% of the cyber attacks in the United States (Homeland Security. 2005). With that being said, we must remem ber that the federal government and private industry have many tics and...

Words: 2550 - Pages: 11

Cell Phone

... by Fernando to provide order for Spanish colonists in their new surroundings. . long struggle to eliminate the Muslim threat to Spain. . management plan for land seized from Native Americans to enable the New World to produce wealth for the Crown. . purging and punishing of non-Christians living in Spain. 10. In 1513 the Spanish Crown issued the Requerimiento, which a. divided Spain’s claims in the New World among those who had conquered it. b. formally enslaved Indians living in territory claimed by Spain in the New World. c. promised Indians who accepted Christianity and the authority of Spain that they would be left in peace. d. required priests in Spanish colonies to be approved by the Inquisition. 1. What was the status of most slaves when Europeans traded for them in Africa? a. captives of war b. criminals c. religious outcasts d. volunteers 2. Time that Africans spent aboard ship en route to enslavement in America was called e. hell on earth. f. middle passage. g. purgatory. h. the good old days. 3. English men and women from the lowest ranks of society who agreed to work in exchange for passage money to the colonies were known as i. contract labor. j. indentured servants. k. undocumented workers. l. wage slaves. 4. Perhaps 90 percent of those who...

Words: 3111 - Pages: 13