Reference Hub5
Mobile Devices: The Case for Cyber Security Hardened Systems

Mobile Devices: The Case for Cyber Security Hardened Systems

Maurice Dawson, Jorja Wright, Marwan Omar
ISBN13: 9781466683457|ISBN10: 1466683457|EISBN13: 9781466683464
DOI: 10.4018/978-1-4666-8345-7.ch002
Cite Chapter Cite Chapter

MLA

Dawson, Maurice, et al. "Mobile Devices: The Case for Cyber Security Hardened Systems." New Threats and Countermeasures in Digital Crime and Cyber Terrorism, edited by Maurice Dawson and Marwan Omar, IGI Global, 2015, pp. 8-29. https://doi.org/10.4018/978-1-4666-8345-7.ch002

APA

Dawson, M., Wright, J., & Omar, M. (2015). Mobile Devices: The Case for Cyber Security Hardened Systems. In M. Dawson & M. Omar (Eds.), New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 8-29). IGI Global. https://doi.org/10.4018/978-1-4666-8345-7.ch002

Chicago

Dawson, Maurice, Jorja Wright, and Marwan Omar. "Mobile Devices: The Case for Cyber Security Hardened Systems." In New Threats and Countermeasures in Digital Crime and Cyber Terrorism, edited by Maurice Dawson and Marwan Omar, 8-29. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-8345-7.ch002

Export Reference

Mendeley
Favorite

Abstract

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.