Friday, May 10, 2019

A Survey of the Current State of Security in Smartphones Term Paper

A Survey of the Current State of Security in Smartphones - Term Paper eccentricThis is why they have found their way into our everyday activities, and entrust them with our most valuable information. The down array to this is that since these technologies are used by people everyday and hold our most important information, they are too extremely prone to attacks. Personal computers screw be hacked, or could digest viruses and spyware, while networks are the address of surety breaches, and of course, smartphones can be attacked as well. These technologies are targets for the same reason we use them they are opened of running our lives. Nowadays, you can do banking from your home or phone. You can transfer bank funds via your network, you can keep the passwords of your utilities in your Smartphone, and you can besides keep track of your stocks and other assets through these methods as well. Attacks write out in different forms and target different kinds of information. This p aper will focus on one of the to a higher place mentioned technologies, the smart phones, it will look at the kinds of attacks that could affect a smartphone, and look at current writings regarding available security options for smartphones. This paper will concentrate on smartphones and it will dig deeper into the current post of smartphone security. It will be discussed as What is a smartphone? Discussion of lit regarding attacks on smartphones Discussion of literature regarding security options for smartphones. ... on a personal digital assistant or a computer. This means that technically, smartphone is a plaything personal computer or laptop that is able to make calls because according to the article, A smartphone also offers the competency to send and receive e-mail and edit Office documents, for example. These kinds of features allow us to do banking, social networking, parley of multiple methods, and asset management through these devices. This is normally used and abus ed by business owners and corporation managers that need to bring their work wherever they go, or by entrepreneurs and free-lance employees and contractors as they may get work orders at any given time. These functions are very useful for people on the sound on a regular basis, and even for people who feel the need to stay connected on a regular basis but as advanced these functions may be, they are also to a greater extent prone to attacks such as viruses and spyware. When comparing regular phones to smartphones, although smartphones generally have more capabilities, they are also much more prone to receiving and being affected by viruses, as some older phones either are not able to receive viruses or even if they do receive them, most to not have the ability to run them. Discussion of literature regarding attacks on smartphones As we know, there are many a(prenominal) different smartphones, using different operating systems, with different interfaces and applications, and as p reviously mentioned, there may be just as many ways of attacking these smartphones. This part of the paper aims to discus current literature regarding the certain kinds of treats and attacks that smartphones are normally vulnerable to. This particular portion also would like to touch on some of the reasons why smartphones get infected or become targets of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.