23 Jan 2023

101

Threats to Information Security: Mobile Malware

Format: APA

Academic level: College

Paper type: Assignment

Words: 364

Pages: 1

Downloads: 0

In the modern world we are living in, mobile usage is indispensable. To communicate to a person who is far away the fastest and effective means of retrieving the message is by use of cell phones. In short, it’s approximated almost everyone owns a phone. The technology has its own challenges for instance the alarming catastrophe of mobile malware ( Georgiou et al., 2018) . Mobile malware is a threat to mobile phones as it causes the collapse of the system and loss or leakage confidential information. The main challenge as a group that has volunteered in working to improve neighborhoods can be majorly associated with the use cell phones hence the need to get informed. 

The history behind mobile malware dates back to 2000 the first mobile virus known as Timofonica which originated in Spain ( Jamaluddin, Zotou, Edwards, & Coulton, 2004) . This virus sent messages that read ‘Information for you: Telefonica is fooling you’ the message spread through the internet. Other viruses that have emerged since then include: Cabir virus which spread itself on Bluetooth wireless networks and infects mobile phones, Trojan virus being the first malicious program it sent messages to premium rate numbers in the owners contact list without the owner’s consent therefore accumulate huge bills. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The most common types of malware programs include; 

Worm: it reproduces itself endlessly and spread to other devices with harmful and misleading information. It doesn’t require user consent to spread it. 

Trojan: This kind of malware require user interaction to spread it hence it appears in attractive applications or the phone itself therefore crashing the phone after a certain period of time 

Spyware: The malware collects and spreads user’s confidential information without the user knowledge 

Expander: Mostly adds the phone bills. 

To curb this malware, several companies have come up with strategies that is, antivirus software. They have quality control checkers on software. However it has been a hassle since there is a rapid evolution of cell phone malware. 

There is need to be cautious while operating cell phones so that there can be confidentiality while handling data and also avoid high bills expenses. Despite some companies creating antivirus software it is still evident that the rapid evolution of malware is challenging hence everyone should be keen while downloading applications. 

References 

Georgiou, A., Magrabi, F., Hypponen, H., Wong, Z. S. Y., Nykänen, P., Scott, P. J., Ammenwerth, E., & Rigby, M. (2018). The Safe and Effective Use of Shared Data Underpinned by Stakeholder Engagement and Evaluation Practice.  Yearbook of medical informatics

Jamaluddin, J., Zotou, N., Edwards, R., & Coulton, P. (2004, September). Mobile phone vulnerabilities: a new generation of malware. In  Consumer Electronics, 2004 IEEE International Symposium on  (pp. 199-202). IEEE. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Threats to Information Security: Mobile Malware.
https://studybounty.com/threats-to-information-security-mobile-malware-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration