ANNOTATED BIBLIOGRAPHY – Impacts of Mobile devices on cyber security

ANNOTATED BIBLIOGRAPHY

Arabo, A., & Pranggono, B. (2013, May). Mobile malware and smart device security: Trends, challenges and solutions. In 2013 19th international conference on control systems and computer science (pp. 526-531). IEEE.

The manuscript elaborates on a study conducted to identify the developments and problems of cybersecurity on smartphone devices. The article assesses the growing demand for connectivity through wireless mechanisms to enhance internet access. The manuscript also states that because of the surge in smartphone use, an increase in threats towards users’ data has also been witnessed. According to Arabo and Pranggono (2013), mobile malware is considered a significant threat to internet access by using smartphones. The article also discusses the effects of cybersecurity on devices along with the possible techniques of curbing the discussed problems. Lastly, the article also offers solutions such as accessing the available applications that assist in safeguarding data during internet access. As a result, the article can provide more information on the effects of mobile handsets on cybersecurity

Bell, R. (2015). Digital steganography: Its impact on mobile forensics, hacking, and social media (Doctoral dissertation, Utica College).

The article provides an assessment of the effects of mobile forensics, social media, and hacking. According to Bell (2015), digital steganography is one of the current advancements in the cybersecurity space, enhancing the aspect of encrypting sensitive information. Steganography, a software, enhances the concealing of crucial messages and data from unapproved users. Moreover, the application is compatible with any operating system on smartphones and computers. The article offers wide-ranging evidence on the extensive research the numerous approaches by hackers to access user data, and the vital roles of installing the application as a cybersecurity framework. Because the article assesses the significance of utilizing applications such as steganography to avert attacks, it may be utilized as a viable source of information in identifying the impacts of smartphones on cybersecurity.

Bertino, E. (2016). Security Threats: Protecting the New Cyber frontier. Computer, 49(6), 11-14.

The article states that cyber-attacks are on the increase each year, leading to a dependence on information and communication technology frameworks. According to Bertino (2016), mobile handsets require a robust defense mechanism due to fresh threats. The technological advancements in information and communication have led to the development of smartphones and cloud computing. The article also elaborates on the new cyber frontiers being used by corporations to secure their data and restrict access to delicate and essential data. According to Bertino (2016), various corporations continue to adopt the BYOD mechanism, allowing personnel to utilize personal devices to execute work-related responsibilities. The article also discusses vulnerabilities attributed to software, and the loopholes may be sealed by using metamorphic testing. As a result of the manuscript’s information, it is plausible to affirm the information can be utilized in conducting the secondary research.

Dye, S. M., & Scarfone, K. (2014). A standard for developing secure mobile applications. Computer Standards & Interfaces36(3), 524-530.

According to Dye and Scarfonr (2014), the article articulates the standards of establishing secure smartphone applications that may not be susceptible to cybersecurity threats. The manuscript starts by providing information on the number of security challenges that arise from the development of applications that expose users to cybersecurity threats. The applications are primarily developed by amateur programmers are not conversant with safeguarding mechanisms for the applications. The manuscript also elaborates on the appropriate mechanisms that should be employed to enhance security. This proves that the article is a viable resource for accessing information due to the author’s experience and knowledge.

Gelenbe, E., Görbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M., &Lyberopoulos, G. (2013). NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem. In Information Sciences and Systems 2013 (pp. 369-378). Springer International Publishing.

The article explores the enhanced security system to develop the provision of seamless services in the mobile network. Since smartphones are popular, hackers are gradually exploiting weak links by installing malware that can tap into private data. According to Gelenbe et al. (2013), smartphones are highly utilized in launching scathing cyber- attacks. Moreover, the article states that the NEMESYS mechanism proves to be the best framework to avert the increased use of smartphones to carry out cyber-attacks. It also explores the various techniques employed to acquire private data. The key aspect discussed in the article is the NEMESYS mechanism, which creates an information collection structure for safeguarding mobile handsets. This is accomplished through the provision of warnings when a threat is detected.

 

 

References

Arabo, A., & Pranggono, B. (2013, May). Mobile malware and smart device security: Trends, challenges and solutions. In 2013 19th international conference on control systems and computer science (pp. 526-531). IEEE.

Bell, R. (2015). Digital steganography: Its impact on mobile forensics, hacking, and social media (Doctoral dissertation, Utica College).

Bertino, E. (2016). Security Threats: Protecting the New Cyber frontier. Computer, 49(6), 11-14.

Dye, S. M., & Scarfone, K. (2014). A standard for developing secure mobile applications. Computer Standards & Interfaces36(3), 524-530.

Gelenbe, E., Görbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M., &Lyberopoulos, G. (2013). NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem. In Information Sciences and Systems 2013 (pp. 369-378). Springer International Publishing.

Friend Essay
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

High Quality Essays

FriendEssay helps with essay papers for all levels of academic courses such as high school, undergraduate or graduate level assignments (any subject). The Asssignment writers at Friend Essays have years of experience in helping students write their essays with expertise in various fields like Engineering, Economics, Marketing etc. You can trust our essay writers to take care of your work without any mistakes or plagiarism. Whether you need a simple 5-page essay or an extensive thesis paper on a complex topic - we will do it with professionalism, accuracy, and skill.

Experienced Academic Writers

All of our paper writers are native English speakers with at least three years’ experience in essay writing. They know what they are doing when it comes to essay formatting requirements for the different types of papers; MLA, APA or Harvard formats - we can handle them all without any difficulty whatsoever.

Free Unlimited Revisions

Paper modifications are like a breath of fresh air! If you need any revisions done on your paper, simply click the revision button and we will happily help.

Swift Delivery and 100% Money Back Guarantee

Friend essay is different from other essay writing companies because they are the only company in the world that offers a money back guaranty on any order!

Original and Confidential

We're committed to making sure that all documents we produce for you are 100% original. Not only do our editors check every quotation in a text, but they also promise the utmost confidentiality with each document service.

24/7 Customer Support

The customer support agents at our company are always available to help you. They can be reached 24 hours a day, 7 days a week and will work hard each time they try to get in touch with you so that the experience is as good as it gets.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

Looking for online essay writer to do an assignment for you? FriendEssay offers a wide range of academic help service such as admission essay writing, research paper help, dissertation writing among others. Simply place an order to get a discount today!

Essays

Homework Help Services

The best part is that we offer essay help on any topic - whether it's literature, history, math or even philosophy! Our specialists know their way around these subjects like no other which means they'll take care of your work as if it were their own and get back to you with quality essays within the time frame specified by our customer service team.

Admissions

Business and Admission Essay

For those seeking professional business writing services such as resume writing, business plan writing, admission essays writing, we are also here for you. We have professionals in distinct business areas who have handled all types of business needs. So, worry no more.

Reviews

Articles and Blog Writing Services

We also specialize in article and blog writing services, so if you're looking to get some content published on the web and need a reliable content writer, simple check the “help with my assignment” service from FriendEssay.com!

Reviews

Editing Support

Whether you need someone who will write an essay from scratch on a topic of your choice or if you want us to edit one already written by yourself, FriendEssay has talented professionals available 24/seven so there's never any essay help delay