Premium Essay

Wireless Devices

In:

Submitted By bigtaco37
Words 2102
Pages 9
TM 562: Wireless Devices and Applications

Table of Contents

Introduction 1 Background about Smartphones 1 Defined Smartphone 1 Different applications on a Smartphone 1 Problem Statement 3 Security Risks 3 Analysis 4 Viruses 4 Threats 5 Recommended Solution and Implementation 6 6 6 References 7

Introduction Statement

If you've ever wondered exactly what a smartphone is, well, you're not alone. How is a smartphone different than a cell phone, what makes it so smart, and how secure is the device? Firstly, IBM designed the first smartphone in 1992. It was called Simon. The smartphone was presented that year as a concept device in Las Vegas at the computer industry trade show known as COMDEX. The first cell phone, on the other hand, was demonstrated 19 years before the first smartphone (Wikipedia).
Smartphones are phones that provide a new genre of application than the standard cell phone. They provide phone plus Internet connectivity and storage, text and multimedia, and multi-tasking. In a nutshell, a smartphone is a device that lets you make telephone calls, but also adds in features that you might find on a personal digital assistant or a computer, such as the ability to send and receive e-mail, scheduling and contact management software, edit Office documents, as well as a built-in camera and mp3 capabilities. However, with the access to the Internet the phone is now subjected to more security issues. If a person can hack the phone, it would enable them to have unlimited information about the consumer.
By definition, a smartphone conveniently combines the functions of a GSM mobile phone and handheld computer into a single device. Smartphones have an operating system and local data storage. Having a smartphone is like having a miniature computer that can also place and receive calls. Though there lacks an

Similar Documents

Free Essay

Protecting Wireless Devices and Enhancing Security in a Wireless Network

...ever changing world, wireless communications has become a major platform for communications at work and at home. With popular mediums (Cell phones, PDA’s, Gameboys, Wii, Netbooks, iPods, etc…) like wireless devices, there are many advantages and disadvantages in operating wirelessly. No matter how you feel about the advantages or disadvantages of the devices, they need to be protected, along with setting up some form of security. On the website Howstufworksvideo (12) they show you the basics on how to setup home Network Security. You can go there can see how it is done. Just a few years ago, (25 Sep 07) there were some so-called experts saying that there was no need to secure your wireless system. In an article, David Ramel alleges that the importance of wireless security is overhyped, that it's now trivial to secure wireless nets and that IT pros have far more serious security concerns they should be addressing -- while home users have little to lose even in the remote chance someone tries to breach their network. (3) This person was obviously living in a sheltered environment because identity theft and credit card theft was out of control then. Now he is saying don’t worry about protecting your network and to just hold on to your wallet; basically. Either he was very innocent or totally clueless and is eating humble pie about now. Here are a few disadvantages. A limited spectrum, war driving, interfering signals can be generated by other devices in the office environment...

Words: 2804 - Pages: 12

Premium Essay

World - Wireless Device Retail Store

...World - Wireless Device Retail Store Budget Proposal For [2011 to 2014/15] BUSN-278 [Term] Professor[name] DeVry University Table of Contents |Section |Title |Subsection |Title |Page Number | |1.0 |Executive summary | | |3 | |2.0 |Sales Forecast | | |4 | | | |2.1 |Sales Forecast |4 | | | |2.2 |Methods and Assumptions |5 | |3.0 |Capital Expenditure Budget | | |5 | |4.0 |Investment Analysis | | |6 | | | |4.1 |Cash flows |6, 7 | | | |4.2 |NPV Analysis ...

Words: 1923 - Pages: 8

Free Essay

Bring Your Own Device

...Case Study 1 Bring your own device (BYOD) Cynthia Lopez Networking Security Fundamental OCT. 26, 2015 Good news now your company has bring your own device program so you can finally use your phone that has more capability than the boring company’s phone. Now you can you can use your new shiny iPhone for work. You can now even check your corporate email from home and stream YouTube videos too all while your company splits the bill. Will now that it all seem great and you are happy to join the company’s bring your own device you wake up reach for your phone to check your emails but it doesn’t turn on its become a brick! You do some family investigation you realize that the little one tried to guess your password and entered it wrong several times your company’s security policy shut down your phone to keep sensitive material from unauthorized access. Your phone is brought back to life and restored but realize now that all your pictures are lost and any notes you might have saved on your phone. It is gone forever. (The Dark Side of BYOD) pg1. Many employees are shocked to know that their personal devices can be asked to be surrendered. In bring your own device companies can track you using GPS on your device to track your whereabouts. Selectively disable camera and microphone when the device enters restricted company areas to prevent sensitive data loss. Online activity can also be monitored to protect the company from any liability arising from an improper...

Words: 663 - Pages: 3

Premium Essay

Data-Hiding Techniques

...personal use) program has a wizard-based interface which makes it very straightforward to use. Point MiniTool Partition Recovery at the problem drive, specify the area to be searched, and it'll scan for the missing partition. A report will let you know what the program has found, and you can recover the partition in a few seconds. You don't get a bootable recovery disc here, so if your system partition is damaged then MiniTool Partition Recovery won't help you very much. Otherwise, it provides a quick and easy way to locate and restore lost partitions [ (Williams, 2013) ]. A tool called BitPim which is a device that specifically works for CDMA devices, such as LG, Samsung, Sanyo and other manufacturers. This tool is a good one for working with devices that use Sprint, Verizon and U.S. Cellular as their providers, since it primarily works well with CDMA carries & devices. This is not a tool I would recommend that a law enforcement agency should use since it is a freeware...

Words: 1131 - Pages: 5

Premium Essay

Body Area Networks

...Healthcare IT Emerging Technology Body Area Networks; Device Interference Suppression Kimberly Miller PSIS 4199 Fall 2013 The advances in microelectronics and wireless networking are contributing to the evolution of medical devices once thought of as science fiction into clinical reality. Ultra-small medical sensors/actuators worn or implanted inside the body have the capability to collect or deliver a variety of medical information and services. The networking ability between these body devices and the possible integration with existing IT infrastructure could allow them to transmit health-related information between the user's location and the healthcare service provider. This opportunity for greater physical mobility can directly translate into a significantly better healthcare experience; and therefore, higher quality of life. Body Area Network (BAN) is the technology that allows communication between ultra-small and ultra-low power intelligent sensors/devices mentioned above. The wearable or implantable nodes can also communicate to a controller device that is located in the vicinity of the body. These radio-enabled sensors can be used wirelessly to continuously gather a variety of important health and/or physiological data that is critical to providing care. Radio-enabled implantable medical devices allow us to further pursue applications that can revolutionize care delivery including smart pills for precision drug delivery, intelligent...

Words: 473 - Pages: 2

Premium Essay

Wireless Technology

...Wireless Technology BIS/221 Wireless Technology Technology has greatly evolved in the past 10 years. There was a time when a paper back book was more common than a cellular or wireless device. Today, however, wireless device are more and more common and are pretty much a must have. Wireless devices simplify how we perform daily task by being easier to access because we can carry these items with us. A few wireless devices that have made my life easier are my wireless printer, GPS, Wi-Fi, Bluetooth, and a few wireless household products. Wireless technology has also allowed disabled individuals to enjoy activities that they normally cannot enjoy. The use of a wireless printer has made it easier to print documents either from my wireless computer or my cell phones. I no longer have to go into the computer room to complete these task. I honestly no longer need a computer room; because I have a wireless computer and printer I no longer have to be in a designated area to complete homework or perform task on the computer. I can now do those things from anywhere in my home. Wi-Fi has also made in possible to surf the web on my computer from anywhere there is a Wi-Fi connected. The use of Wi-Fi has eliminated the need to use cellular data in turn lowering my cell phone bill. The use of GPS has also made it easier to navigate to unfamiliar places by enabling me to easily get direction either from the GPS on my cell phone or a dedicated GPS device...

Words: 537 - Pages: 3

Premium Essay

Wireless Signals

...Wireless Communications are very important in our daily lives. Practically everywhere we turn we can see someone working away on a laptop, an iPad, or some other form of wireless PDA. This form of communication is usually used for personal and professional reasons. There are four main types of wireless technology in play here. The four types of wireless technology is Wi-Fi, Cellular, Bluetooth and WiMAX (Cox, 2013). Wi-Fi is the most popular form of wireless technology that we come to depend on today. Wi-Fi uses IEEE 802.11 specifications to provide secure network connections at home, in the office and in the public at places like libraries, coffee houses. Many business offices have Wi-Fi set up so that their employees can be more mobile using laptops they can retreat from their desk and in to a conference room for a quiet space to work. Wi-Fi connection within a network presents challenges for any IT group with regard to security as well as architecture of the network. Many wireless Routers and AP’s are designed to provide quick speeds and secure connection for Wi-Fi some more powerful than others. Many PDA devices are being designed to act as a hot spot, providing Wi-Fi access to laptops and other devices. This brings me to speak about Cellular technology. When we think of cellular technology, we mostly think about being on the go and needing to make a phone call with a wireless phone. Cellular signals use connected transmitters or cells as Michael Cox calls them to...

Words: 725 - Pages: 3

Free Essay

Wireless Technology Upgrade

...Wireless technology upgrade Tony Madrid Keller Graduate School of Management of DeVry University Decatur, Georgia NETW562: Wireless Devices & Apps Table of Contents Introduction 1 Strategic business assessment 3 Competition 4 Tradeoff analysis and rationale 5 System selection 5 Customer devices 6 Design a Wireless System 7 System description 9 Efficient Support 9 Quality of Service (QoS) 10 Service description 10 Network Detection and Selection 10 Service Continuity with Seamless Connections 10 Topology Independence 10 Coverage analysis 11 Initial capabilities and limitations 11 Less Complexity, Faster Transmission 13 Enhanced Mobile Gaming 13 Presence 14 Broadband Access in Remote Locations 14 Financial outlay 16 Conclusion 17 Wireless technology upgrade Introduction In telecommunications, 4G (also known as 4-G) is an acronym used to refer to the fourth generation of technologies for mobile telephony. It is the successor of the technologies 2G and 3G; 4G is based entirely on IP protocol, with a system of systems and a network of networks, which is achieved through the convergence of wired and wireless networks. This technology may be used by wireless modems, smart phones and other mobile devices. The 4th generation technology gives ultra broadband experience over the internet access on mobile devices, like, laptop with USB wireless modems, mobile devices and smart phones. Imaginable application, which includes, the...

Words: 4563 - Pages: 19

Free Essay

Near Field Communication

...Description…………………………………………………………..3 Nfc Technology………………………………………………………………3 Near Field Communication Requirements………………………………..3 Project Goals and Objectives………………………………………………3 Project Risks…………………………………………………………………4 NFC Limitations……………………………………………………………...4 Project Description: Near field communication (NFC) is a wireless magnetic field induction. NFC works on a communication channel with a range approximately one decimeter. Operates on a ISM band of 1356 MHZ with data rates nearly up to 424 Kbps. NFC is mostly used on mobile devices, smart cards and electronic identification chips these NFC equipped devices are used on a security sensitive applications. For example; Electronic Ticketing, Payments, Access Control, identification. NFC enabled mobile phones can be a consumers electronic wallet with numerous advantages. NFC Technology: A standard NFC operates on a two modes of operations, active and passive. During the passive mode the user generates a radio frequency field (RF) to energize the target, in return the target responds by a load modulation scheme on the field that is generated by the user. In active mode both the user and target devices generate their own Radio frequency field. The user sends information on a radio frequency field and the target answers on another Radio frequency field. Near Field Communication Requirements: NFC technology generally...

Words: 546 - Pages: 3

Free Essay

Analyze the Necessity for Different Protocols in Wireless Communications.

...Analyze the necessity for different protocols in wireless communications. An agreed upon guidelines or set of rules for communication is called as protocol. It is very important to agree upon some communication rules otherwise it will fail. If one party speaks French and the other German the communication would surely fail. If they both agree on a single language they can communicate successfully. The set of communication use don internet is called as TCP/IP. A protocol can be defined as rules that are mutually agreed upon for communication. During communication it is important that both the concerned parties speak a common language, only then communication would work. The communication protocol used on internet is TCP/IP. It is a group of different protocols and each protocol has its own special function. The protocols have been established by international bodies and are globally used to ensure a common worldwide platform. For wireless networking there are varieties of protocols and the most popular is 802.11b as it is the most inexpensive one. The maximum speed that can be achieved is 11mbps. The only drawback is that it operates in the unregulated frequency range of 2.4 GHz, which can lead interference to the network traffic from other devices like cordless phone and baby monitors etc. There is a newer improved version protocol 802.11g, it uses the same frequency range of 2.4 GHz that is commonly used, but this protocol can take transmission speed of maximum 54 mbps...

Words: 401 - Pages: 2

Premium Essay

Ups Diad Case Study

...1. List the various ways that DIAD(Delivery Information Acquisition Device) improves customer service. DIAD has improved customer service by: * Real time tracking and data tracking – The ability to track customer package on the spot using Technology (GPRS/CDMA) * Fast delivery and on time * Accountability and Reliable – Efficient tracking * Efficient and Reduction of data entry error * Availability information and immediate Response – Scanning the package and all information related to the package is readily available. 2. Write out the steps a package takes from pick-up by a UPS driver to delivery including the role of DIAD, the USP Data Center, and the UPS Package Center. Steps: * The process begins with the information of the package and its destination is add by the customer. * The information of the package is sent tothe main database system of UPS, the system automaticallycreates a“smart label” which is then attached to the package for shipment. * Package is picked up by a driver who has a DIAD which shows the place of delivery and new pick-ups. * Once package is picked up and delivered by the driver, the package is scanned to show all the information that was sent up to the main data center. Customers will be able to track their package with the information provided on their package. * The system concurrently gets updated whenever a package is scanned through the center. When all the information is updated...

Words: 807 - Pages: 4

Premium Essay

Integrative Network Design

...because of the company’s recent growth there will be challenges that will happen especially with the network so a good integrative network design must be developed in order to continue this positive trend both in present and in the future. Kudler Fine Foods is taking the next step to upgrade the existing infrastructure with new wireless technology which will provide a better communication link for not only all of the stores, but for all of the employees as well. Kudler Fine Foods wants to implement a new network design that will connect their three locations that is spreaded out across the U.S. With the new systems and servers the ability to maximize the company’s profits will increase overnight. This new inventory system will allow the stores POS systems to alert the warehouses to ship more products when they are running low automatically. This will eliminate the need of wasted man hours checking the stock. Using a Wide Area Network (WAN) would be the best choice for connecting the three locations together. They also want to implement a communication system throughout the network of their stores and make the internal network in each store a Wireless Local Area Network (WLAN). The communication throughout all the stores will be upgraded with a VoWLAN system that will give the employees the flexibility of taking calls and the ability maintain and provide the services needed for each customer. The other technological advances...

Words: 3955 - Pages: 16

Premium Essay

Hello

...and air traffic control stations. In flight entertainment is also a product of information technology, video games, video films are examples. -buses and coaches and taxis, in many countries with develop tourism business; they are equipped with radio communication system as for various users. For example, the driver or the tour guide updates the Tour Company headquarters about the progress of the tour throughout the touring period. This communication ensures the safety of tourists Fast and easy Accommodation: specialisation and intelligent technology Technology on wireless communication systems - enabling voice, text and data communication among employees, managers, departments and guests is now being adapted by hotels. Comprised of intelligent system software and lightweight, hands-free or handheld communication devices, these systems allow hotel staff to deliver the best customer service. Examples of wireless communication solutions for the hospitality industry include: communication badges, food and...

Words: 414 - Pages: 2

Premium Essay

Mid Case2Chap1

...destination center has all the information on hand available, for routing purposes and planning ahead of time In which,  DIAD IV  shows the places of delivery and new pick-ups (if needed)  UPS data center  customers can track all information about their package  The UPS Package Center  scans and updates package Question 3 To ensure maximum flexibility in field transmission capabilities the DIAD IV includes multiple wireless connectivity options, which are wirelessly connected to the main processing centers and the package centers. Generally UPS trucks contain a transceiver to work with the local driver's DIAD IV, and then communicate that information wirelessly back to the UPS processing center. Each DIAD IV features a built-in GPRS and CDMA radio, an acoustical modem to facilitate dial-up access if necessary, and 802.11b wireless local area network connectivity to enable transmission in a UPS center. The DIAD IV also features a Bluetooth wireless personal area network and an infrared (IrDA) port to communicate with peripheral devices and...

Words: 417 - Pages: 2

Premium Essay

Lkt2 Task 3

...secure both network footprints to become the newly joined and Secured MAB infrastructure. After further review of the two legacy networks, it has been determined that the Myrtle Group has security challenges that are uniquely different from that of the Bellview Law group. Myrtle & Associates has a more modern IT infrastructure. Their Case Management System is Web based therefore presenting an additional set of security challenges. In addition, there Domain Controllers and there File Server operated on Windows Server 2008 while the Bellview systems utilize Novell. The Bellview Law Group has a legacy Case Management System. Their network at this point can only be accessed at the onsite location. The Bellview Company has no web or wireless system access and all of its system assets are hard wired locally. These systems currently utilize Legacy Novell backbone to support its File Servers, Case Management System and it’s Directory Services. While connecting the two networks can be accomplished, there are some potential challenges facing the MAB network. A Windows Server 2008 Domain controller should be added to the Bellview side of the network. The MAB leadership must consider obtaining some immediate cross-training so that associates can obtain the knowledge to operate both case Management Systems. Future phase of this project will require upgrading from legacy Case Management Systems to a universal Case Management System to be used by all authorized MAB employees. Managing...

Words: 934 - Pages: 4