Mobile Computing Security
The modernworld of technology has experienced a rapid growth in the number of mobile handset users, including businesses. As a result, smartphones have been employed by the users, both individuals and businesses, as their tool for conveying communication and for planning and organizing their private life and work. The present mobile devices and smartphones in the consumer markets have high data storage, collection, and compilation capabilities, and also store sensitive information. The significance and sensitivity in the information held within the devices’ storage calls for controlled access to the device for protection purpose, of any intellectual property or confidentialities of any individual, organization, or company (Tanenbaum and Maarten 15).
In order to ensure that the confidentiality level of the information held within such devices is retained or increased, sufficient access control measures will have to be put in place, that way, the level of privacy and sensitivity of the information held will have been enhanced. Internal and external attacks that may result into loss of vital information and data from a mobile handset pose a big risk for the users, which may in turn adversely interfere with the business, or individual’s undertakings. The disparity to keep information held within the devices safe and private from unauthorized access has seen several efficient and secure regulatory protocols and schemes proposed to safeguard mobile computing from external attacks. However, the security control schemes and protocols that have been put in place have been unable to effectively resist, detect, and prevent the internal attacks.
Technological advancement in the current world of information technology has indicated that attackers are able to launch an attack from the internal platform of any mobile handset network. This ability presents a major risk on common mobile computing and beneficial techniques. This calls for a secure mobile computing protocol that will see to it that user information and data is highly secured during the transmission process. This research aims at proposing a proper data transmission protocol that will see to it that all data and information conveyed via mobile devices is highly secured through mobile computing.
Mobile computing refers to a type of technology which allows the users to convey information and data by use of computers without need for connecting to a fixed physical link. The establishment of mobile voice communication globally has seen the number of subscribers within the platform increase rapidly. Mobile communication technology, unlike that which was available in the past, empowers users to receive and share data across the network. This growth has been accompanied by a couple of security threat issues on user information and data which raises concern on the level of security and privacy of the user’s information(Tanenbaum and Maarten 15).
Technological advancement in the current world of information technology has indicated that attackers are able to launch an attack from the internal platform of any mobile handset network(Tanenbaum and Maarten 15). This ability presents a major risk on common mobile computing and beneficial techniques. This calls for a secure mobile computing protocol that will see to it that user information and data is highly secured during the transmission process. This research aims at proposing a proper data transmission protocol that will see to it that all data and information conveyed via mobile devices is highly secured through mobile computing.
Background of the study
A new paradigm of mobile computing has been engendered by advancements in wireless networking technology which has empowered the users to walk about with portable computing devices, thereby allowing them access to data and information irrespective of time and location. This has facilitated smooth and easy communication between the users, and a continuous flow and access to services offered on the network. Given the sensitivity and level of confidentiality of the information and data flowing through the system, there have been security concerns on the degree of privacy and safety of users’ data held within the devices. As a result, this research was conducted with the aim of establishing the security issues in mobile computing.
Traditionally, access control and user authentication has been relied on by small networks and stand-alone computers in provision of security. The two methods are physical and as a result, rely on system-based controls in verifying the identity of a process or individual, in order to exclusively restrict or allow access to use, alter, or view the resource held within the computer(Tanenbaum and Maarten 23). However, these methods have been rendered inadequate due to the high level of flexibility that has accompanied distributed networks such as mobile computing environments andthe internet. Such systems have users that have not all been predetermined and as is not enough, the system also lacks a central control. As a result, the users are able to access their data, services, and vital information, locally hosted within their mobile handsets or network irrespective of time and place. This has seen the level of insecurity in mobile computing increase which has yielded problems of access control and security risks (Kagal, Tim, and Anupam 154).
The security level of mobile computing, due to wireless communication, is lower compared to wired communication and as such, compromising on the information or data being shared becomes much easier, especially if the range of transmission of the information and data is wide. As a result, there has been increased pressure on mobile computing designs to encompass high security standards. In order to distinguish between secure communication and insecure, encryption methods would be employed which normally constitutes the use of software or specialized hardware such as the CLIPPER chip (Kagal et.al. 155). The level of security varies depending on the undisclosed encryption that should only be known to the user/ authorized parties.The portability of computers also heightens the risk on data as it could be easily stolen, damaged, lost, or gained unauthorized access to. The risks could be reduced by moderating the quantity of essential data on board.
This research has closely examined mobile computing security issues. Mobile computing has quite a number of security challenges going for it, with the primary threats being risk of unauthorized access to personal and confidential data. The research gives suggestions that could help in resolving the mobile computing security issue. The research identifies a few data security control measures, including data encryption, creating back-up, among others.
Kagal, Lalana, Tim Finin, and Anupam Joshi. “Trust-based security in pervasive computing environments.” Computer 34.12 (2001): 154-157. Print.
Tanenbaum, Andrew, and Maarten Van Steen. Distributed systems. Pearson Prentice Hall, 2007. Print.
Zheng, Pei, and Lionel M. Ni. Smart Phone and Next Generation Mobile Computing. Amsterdam: Elsevier, 2006. Internet resource.