Wednesday, May 15, 2019

Security in New Generation Cell Phones Research Paper

Security in New Generation carrel Phones - Research Paper modelingTechnology in every new generation provides major improvements from the previous generations. In the cellular communications, in that respect was first the 1G and 2G generations. These generations contributed to the provision of the internet for the mobile thinks through the 3G dominated the scene. The third generation cell earphone internet had advancements that made it stand up from the earlier versions of 1G and 2G. The 3G had the capacity to converge voice and the data with the radio receiver internet. This makes it suitable for transmitting data in high quantities. Additionally, migration towards the 4G technology has been witnessed. Regardless of these processes and developments, the gage of cell phone remains paramount. Ensuring the security of the cell phones The continuity in the manufacturing and distribution of cell phones leads to the rise in the security risks in different ways. Users of electronic g adgets like cell phones should be more concerned about their safety. Lately, electronic artifices such as the Apples iPhone latest version and the Googles Android have connected themselves to the manufacturing and development of cell phones with 3G networks so that they possess the same features and functions of computers. Although this promotes great conveniences, it also comes with severe security risks. two the new and future generations of cell phones require the setting up and update of security software. This software includes firewalls, anti-virus software, operate system patches, anti-spam software, file encryption, and the anti-spyware software. This requires the observance of the basic home computer internet safety and guidelines. The revolution in the field of information technology has enabled most financial institutions to adopt mobile banking technologies to enlarge their customer bases. Cell phones users are required to conduct their business and financial transac tions online. As a result, they will involve to store their login passwords with the information pertaining to their credit card and personal details. With this trend, there will be more cases of online fraud, personal identity theft, more spam, digital forgery, data theft, and any other cyber crimes. Besides, it can also lead to the denial of disseminated benefit attack. This has the risk of disabling the network service supplier. Additionally, cell phones are prone to theft based on their portability compared to desktop computers. Since most theft cases occur unexpectedly, a cell phone user can put up a lot of information and data stored in the mobile device. In the event that the mobile device contains business and financial information of the user, the thief can use it to defraud the user of his or her finances. This is a major security concern. Additionally, the new generation cell phones come with applications that display the users localization principle and movements. O ne such application is the opt-in text advertisements that give information on the whereabouts of the user round the clock. hacker stalkers can use this information to trail their victims and even do felony acts to them.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.