Wednesday, May 1, 2019

Analyze the impact of technology on a field of study of your choice Essay

Analyze the impact of technology on a field of study of your choice - Essay ExampleIt is observed that today alert devices proliferate in corporeal environments as these devices can be easily connected to company networks. Although these devices have become an inherent part of the modern life, they raise certain potential challenges to the cyber security. According to experts, it is relatively easy to hack vigorous devices as compared to other computer devices. Hence, they are highly prone to entropy theft. In addition, today bustling devices are widely used for cyber crimes because this practice reduces the chances of being caught. Despite numerous advantages including high productivity and great convenience, mobile devices raise severe threats to cyber security. According to a study conducted among IT professionals (as cited in Dimensional research, 2012), nearly 89% of the organizations connect mobile devices to their corporate networks. Roughly 65% participants responded t hat their employees used private mobile devices to find the corporate networks. The participants also indicated the major mobile platforms used to access corporate networks were Apple iOS (30%), BlackBerry (29%), and Android (21%). bulk of the participants (64%) argued that there has been an increase in mobile devices-related security risks to their organizations over the past two years (Dimensional research, 2012). ... For instance, it is lots observed that employees connect their personal mobile devices to unprotected company networks like Wi-Fi in order to access internet. This practice increases the chances of malware attacks on the company networks and subsequently the malware-affected network may cause to lose the valuable personal credit line information stored in the companys mobile devices. In addition, fraud employees can easily replica sensitive company information to their personal mobile devices within seconds and such issues can challenge the tights cyber security . Similarly, mobile devices are super prone to theft and loss due to their small sizing and high portability. If mobile devices reach the hands of third parties, they can access the entropy stored in it use highly advanced applications even though those devices are password-protected. Due to their small size, it is easy for external large number to steal mobile devices. Evidently, data theft by individuals would more harmfully affect an organization than data loss due to malware attacks. In case of data theft, there might be a surmisal of leaking the sensitive data to business competitors. This type of data loss or theft from mobile devices would extremely impact individuals too. Probably, people will store their family-related images and videos and other personal documents on their mobile devices. If such data are accessed by unauthorized people, this would cause great troubles to the users. Kuspriyanto and Noor (2012) point that the use of NFC (near field communication) in mo bile payments systems make mobile platforms vulnerable to financially motivated cybercrimes. Evidently, such issues often cause users to suffer great financial losses. Today,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

the punk experience essays

the punk experience papers In 1994, chief Oliver Stone and storywriter Quentin Tarantino made the encapsulation of the American artful cu...