Each response should be 150-180 words.

Need induvidual responses of two discussions of 150 words each for below posts.Responses will be posted after assignation

Post 1

Mobile Security

The mobile systems resemble some other PC gadget which is used ordinary and must be secured like computers. Mobile devices incorporate the Smartphone, PC, smart watch, and wearable operating systems and applications. The most famous mobile gadget working systems are Apple iOS, Android and Windows Mobile. In contrast to each other electronic device, a wireless is a sensitive bit of innovation and it has vulnerabilities that may pose a security threat. Mobile apps incorporate malware-based risks, gadget based vulnerabilities and information burglary related risks (Green, 2017). These are on the whole risks that sway the user. On the off chance that anybody uses the system for business purposes, be that as it may, there are various different risks as well, such as risks from unapproved users accessing the organization’s cloud and threats from unsecured networks.

One such major vulnerability to mobile platform could be weak device and app encryption. An ongoing study found that less than 6 percent of budgets for the creation of mobile apps go to security. This is surprising given how much information is transferred to phones. Based on-gadget workers use to access corporate information on their phones, an absence of insurance for the mobile application doesn’t look good for you. For instance, mostly correspondence happens through electronic medium (Green, 2017). User send, transfer and get vast quantities of information consistently, and leaving it decoded leaves the entryway open for others to take a gander at what your association says or does. Frameworks regularly neglect to encrypt network movement when assurance of sensitive communications is required. Encryption must be used for all encoded connections, especially apps that are accessible through the Internet (Selvarani & Ravi, 2014).

Now days with detailed education about the security threats and vulnerabilities in different platforms the users are much more aware about the risks to their mobile devices as they were earlier. This is the reason that people are getting particular about using the different applications that could provide them security on mobile applications.

References

Green, D. (2017). Top 10 Vulnerabilities in Mobile Applications | WhiteHat Security. Retrieved 21 April 2020, fromhttps://www.whitehatsec.com/blog/top-10-vulnerabilities-in-mobile-applications/

Selvarani, D., & Ravi, T. (2014). A Review on the role of Encryption in Mobile Database Security. International Journal Of Application Or Innovation In Engineering & Management, 3(12), 76-81.

Post 2

Mobile Malware

Mobile vulnerabilities have increased in the last decade along with the development of mobile devices and the increase in the usage of smartphones. There are different types of vulnerabilities that open the device to be attacked by hackers and intruders. In my opinion, Mobile Malware is one of the main reasons for attacks and vulnerabilities in a mobile device. Malware is a common risk for any electronic device like a computer, tablets, smart TVs, etc. This malware installs itself on the device and starts infecting the system by clogging the CPU or exposing the location details or corrupting the system. There are different types of malware like spyware, adware, viruses, downloads, etc.

Spyware is a type of malware that acts in stealth mode so that the user cannot detect that the device is infected by malware and can have the capability to expose critical information like credentials to accounts like usernames, passwords or can send location data to hackers, etc. Madware is another type of malware that floods the device with different types of ads based on the information collected from the device. There are multiple pop-ups that show up while using free applications and games. These popups can contain malicious URLs, when clicked can install malware into the system and corrupt the device. Any suspicious URLs or unrecognized downloads like downloads form an unauthorized user should be ignored. (Forcepoint Team, Mobile malware)

Mobile devices can also be affected by different types of viruses and trojans. The evolution of malware has developed very sophisticatedly that they have now started targeting based on domain. There is different malware that targets banking information. Some malware blocks the device and shows a message that in order to unblock the device pay this much of money. Most of the mobile malware now a day is spread through free ads and clicking on the ads will end up infecting the device. There is one another setup called SMS trojans that increase the mobile charges by sending SMS unnecessarily and read and share the financial information that is exchanged over the text messages. This type of malware has affected android users once. (Kaspersky Team, Mobile Malware)

There are some steps that can help in preventing the mobile device from getting attacked by malware. Don’t jailbreak the device so that the built-in security of the device is intact. If you have to use any public networks, use them through a VPN service. Any download or installations should be done only through reputed providers. If there is any sensitive data that is on the device use encrypted storage so that even if the data is stolen it stays encrypted and useless for the hacker. Use antivirus software and run regular scans to identify any malware attacks. Keep the software of the device up to date for the latest security patches. These are some of the steps that help in securing the device form malware. (David Page, 2018)

References

Force Point Team, What is Mobile Malware? April 2020, from https://www.forcepoint.com/cyber-edu/mobile-malware

Kaspersky team,(2020), Mobile Malware, April 2020, from https://usa.kaspersky.com/resource-center/threats/mobile-malware

David Page (2018) 5 Ways Your Mobile Device Can Get Malware, April 2020, from https://www.securitymetrics.com/blog/5-ways-your-mobile-device-can-get-malware

Requiremements

1) Each response should be 150-180 words.It should be also be cited according to APA format and atleast have 2 references not old more than 5 years.

2) It will be sunmitted it into safe asssign so the match percentage should be less than 15%.It means absolutely no plagiarism.

3) Some points mentioned by my professor regarding APA format

a)Citations: First off you can not just use any website. It needs to be of academic quality not just some random website. Also when you cite a website you do not just copy the hyper link and paste it in. There is more to it than that. There are lots of cites to help you with this. One example is https://www.citationmachine.net/apa/cite-a-website

b) APA Format: Many of you are not even trying to do APA format. You guys are missing a lot of the elements. Here is a link that will help you with a sample paper: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_sample_paper.html

c) Plagiarism: Some of you are getting a really high percentage on this. If the school feels you are plagiarizing you can get in a lot of academic trouble. I saw one person theirs was 80%

d) Typos: It is your responsibility to make sure that spelling and punctuation are correct. Some of you are not using comments and/or having some serious spelling errors. Once you post an assignment you need to verify that Blackboard did not mess it up and if did you may have to go back and MANUALLY fix it.

 

Image preview for each response should be 150-180 words.

Each response should be 150-180 words.

APA

372 words

 

Each response should be 150-180 words. was last modified: by