Mobile devices transport data via wireless networks, which are typically less secure than wired networks. These wireless networks can leave non-encrypted information at risk of interception and compromise. Malware. Communications networks can be used to deliver viruses and other forms of malware to mobile devices.
What is security in mobile computing?
Mobile Device Security refers to the measures designed to protect sensitive information stored on and transmitted by laptops, smartphones, tablets, wearables, and other portable devices. At the root of mobile device security is the goal of keeping unauthorized users from accessing the enterprise network.
What security consideration should involved in mobile and wireless computing?
Confidentiality, preventing unauthorized users from gaining access to critical information of any particular user. Integrity, ensures unauthorized modification, destruction or creation of information cannot take place. Availability, ensuring authorized users getting the access they require.
What are the major components of security in mobile computing?
Similar to traditional networks, the goals of securing mobile computing can be defined by the following attributes: availability, confidentiality, integrity, authenticity and non-repudiation.
What is mobile computing with example?
Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage, which allows for the transmission of data, voice, and video. Mobile computing involves mobile communication, mobile hardware, and mobile software.
What are the issues in mobile and wireless security issues?
A lack of adequate security in wireless networks can lead to criminal attacks such as theft of data, corruption of system integrity, hacking, sabotage, espionage, theft of capacity, and loss or theft of mobile and portable devices (Krone 2006).
What type of computer is suitable for mobile use?
Types of Mobile Computer Devices Page 2 There are six major types of mobile computer devices: laptop computers, notebook computers, tablet computers, PDAs, smartphones, and portable data terminals. The first three are often called “portable” computers and the second three are often called “hand- held” computers.
Why mobile security is important?
Mobile security involves protecting portable devices such as laptops, tablets, smart watches, and phones against cyber threats. Today, the need for protection is more critical because we store a lot of sensitive data on these devices. Studies show that mobile banking is one of the top three most used apps by Americans.
What are the characteristics of mobile computing?
Characteristics of Mobile Computing
- Portability – The Ability to move a device within a learning environment or to different environments with ease.
- Social Interactivity – The ability to share data and collaboration between users.