You are on page 1of 6

Mobile Technology and Security 1

Araf Leghari
Professor Sandra Tavegia
CSIT 101
September 21
st
, 2014
Mobile Technology and Security
As the technological world continues to expand daily, its products continue to
shrink in physical size; for example, consumers have now moved from big computers to
slim tablets and from heavy mobile phones to pocket-sized smartphones. Today,
technology has multiple features and advanced applications over the mobile phones that
were not available few years back. The advancements in mobile phones have become a
very useful resource for students, teachers, parents, etc. Every different set of gadgets,
which were considered luxurious elements until recently, have now been combined and
put into a compact, user-friendly device known as the smartphone. Rather than dealing
with the hassle of carrying around cameras, laptops, mp3 players or even flashlights,
consumers can easily access typically used items with a tap of a finger.
Recently, technology has reached another level with the newly launched iPhone
6 consisting of iOS 8, a software designed by Apple for Apple launched iPhones, iPads
and iPods. This software allows the user to operate multiple applications at the same time
by just touching, pressing and sliding his or her finger across the screen; however, with
such extreme developments in technology bring more security threats to the users.
In his article, iOS 8 Fixes Dozens of Security Flaws, Larry Seltzer discusses
how Apple has fixed many flaws found in older versions of iOS. The most common
method hackers use to access sensitive information is known as web kit browsing, a tactic
Mobile Technology and Security 2

that begins when a user opens a certain web page. If the attack is successful, the hacker
can ultimately gain access to the victims computer, phone or tablet. Furthermore, the
attacker can get access to users phones and install an application that can sometimes
provide him or her with more power over your device. Apple has also reduced the
security flaws by developing various applications, such as fingerprint locks. Even if
someone tries to bypass the users database, the iOS8 stops it and alerts the user of the
bug and requests permission to enter. Still we cannot say the users are entirely secure
because as the author mentions in his article, It is Apples usual practice not to fix them
on earlier versions, so users who remain on iOS7 remain vulnerable to these issues. In
short, we have come to a new era where the rapid change in technology is simplifying
consumers daily lives while simultaneously introducing security threats with every new
development.
In the second article, With eye on Apple Pay, Apple joins secure chip
technology non-profit Global Platform, the authors discuss Global Platform and their
application that they deploy on chip technology. The majority of credit card companies,
Apple and Samsung are members of the Global Platform. Apple has taken technology to
a new level, introducing Apple Pay, an electronic wallet through which a user can pay his
or her bills (only where NFC technology is supported) by saving credit card and bank
information. In addition, to secure the sensitive information and to control potential
fraud, a cellphone will ask for verification via fingerprint recognition. On the other hand,
if any attacker or hacker were to gain access to the person phone, the results could be
devastating to a users life. In brief, advancement in technology may make consumers
lives easier, but it comes with the price of giving more opportunity for attackers to access
Mobile Technology and Security 3

confidential information.
The third article, Android L Will Keep Your Secrets Safer, written by
Katherine Noyes, discusses the security of mobile technology. She mentions that Apple
recently increased its security measure in iOS8 and that Google has already provided
encryption in earlier models of Android (Noyes). In previous models of Android, users
have had to activate encryption, which is fairly complicated task for a basic user.
Furthermore, Apple and Google will be defaulting encryption in their cell phones for
multiple reasons. These two companies want themselves to keep out of law enforcement.
By defaulting encryption, law enforcement cannot go to the technological companies to
request data off the phones of people under investigation. These companies will also save
significant amounts of money, time and loss of costumer loyalty; however, consumer will
not be entirely secure. As Michael Morgan, an independent mobility analyst said, I think
it is a good move by companies to make encryption standard, but consumers should not
be led to believe that they are now 100 percent safe (Noyes). This means that hackers
still have room to hack into mobile phones. Everyday security experts of these
technological companies must try to outthink potential hackers by developing creative,
new software. In conclusion, it is a never-ending war between two competitors
(companies and hacker) of technology.
Katherine Noyes writes the third article on September 19, 2014 for Tech
World. She writes about business and technology, particularly on open software. She is
well known in her field for having written many great articles. Her article was relevant to
my previous two articles because she covers the security of mobile technology in depth
with quotes of higher executives in technology field. She discussed technology
Mobile Technology and Security 4

advancement by praising Apple and Google that they have taken the right step by
securing their consumer privacy. Nevertheless, she was informing consumers that even
with theses advancements, you are never entirely secure. Her information is reliable
because of her many years experience and reputation in her field. In addition, Ronald
Gruia, director of Frost and Sullivan and Michael Morgan, has supported Katherine
Noyes statements.
The fourth article, Managers insight into Mobile Security was written by
Allen Martin. He mentions that mobile security is a critical issue for both individuals and
companies, but that not that enough people are aware of its significant consequences.
Moreover, he says that the companies are at high risk if they are not investing into
security technology for their computers and mobile phones. In addition, the author gives
companies Six Golden Rules For Mobility Security (Martin). Those rules are: develop
mobile use policies, manage and deploy security centrally, invest in security systems,
make encryption mandatory, be realistic with passwords and be a realist. First,
developing a mobile use policy means whenever there is new software or hardware
introduced in a company, there should also be a new security update. Managing and
deploying security centrally means that not only the information technology department
is responsible for a loss of data; in fact, every worker is responsible for data loss. The
third rules suggests that companies should invest in solutions that are easy to access and
flexible to their personal needs. The fourth advises to make every device a company
owns encrypted. The fifth rules states that companies should make passwords realistic
and difficult to crack, which means the should not give employees a choice to chose their
own passwords because they will choose ones that will be connected to their personal
Mobile Technology and Security 5

lives. And lastly, a company should be realistic and educate their employees about the
power of the Internet, technology, security and viruses. To summarize, companies should
take precautions to protect themselves against hackers.
The fifth article, Mobile Media Technology and Popular Mobile Games In
Contemporary Society is written by Hyung Min Kim. In this article, the author discusses
the advancements of mobile technology and the necessity of mobile phones in our daily
life. A mobile phone has become an integral part of our everyday life. We keep our
mobile phone with us at all times: from wakening up until we go to sleep. For example,
as a person wakes up, the individual checks his or her emails or news, and as he or she
goes to sleep, the individual sets his or her alarm. A mobile phone has become a toolbox
that consists of a calculator, a camera, videos, songs, books, etc. People are possibly even
too dependent on the cell phone because of its recent incorporation into daily life. As a
result, there is statistical data proving that the usage of smartphones is increasing every
year in millions. In the final analysis, the usage of smartphones continues to increase as
technological research continues to develop.
In order to find the scholarly journal articles, I used the Community College of
Baltimore County librarys website and searched for the words, mobile, mobile
technology, and mobile security. I found the fourth article using Pro Quest database
to. I used theses databases because of their authenticity, accuracy, and access as a student
of CCBC. It was difficult to find the article related to my topic in database. In contrast, it
was much easier to find it on the Internet sites such as zd net, economist, tech crunch, etc.


Mobile Technology and Security 6

Work Citied
Seltzer, Larry. "IOS 8 Fixes Dozens of Security Flaws | ZDNet." ZDNet.
Zero Day, 18 Sept. 2014. Web. 18 Sept. 2014
Allen, Martin. "An IT Manager's Insight into Mobile Security." The British Journal of
Administrative Management (2006): 22-3. ProQuest. Web. 20 Sep. 2014.
Hyung-Min, Kim. "Mobile Media Technology And Popular Mobile Games In
Contemporary Society." International Journal Of Mobile Marketing 8.2 (2013):
42-54. Business Source Premier. Web. 20 Sept. 2014.
Noyes, Katherine. "Android L Will Keep Your Secrets Safer." TechNewsWorld: All
Tech. Tech World, 19 Sept. 2014. Web. 20 Sept. 2014.
"With Eye on Apple Pay, Apple Joins Secure Chip Technology Non-profit
GlobalPlatform." Apple Insider. Apple Insider, 15 Sept. 2014. Web. 21 Sept.
2014. <http://appleinsider.com/articles/14/09/15/with-eye-on-apple-pay-apple-
joins-secure- chip-technology-non-profit-globalplatform>.

You might also like