1 / 10

IT TECHNOLOGIES

BY: JEROME +SHADY+. IT TECHNOLOGIES. MOBILE SECURITY. MOBILE SECURITY. Mobile devices can be both the instruments and victims of privacy violations. Google’s latest innovation, Google Glass, has been pre- emptively banned at a diner in Seattle due to

tal
Télécharger la présentation

IT TECHNOLOGIES

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BY: JEROME +SHADY+ IT TECHNOLOGIES

  2. MOBILE SECURITY

  3. MOBILE SECURITY Mobile devices can be both the instruments and victims of privacy violations. Google’s latest innovation, Google Glass, has been pre-emptively banned at a diner in Seattle due to the security implications of an unobtrusive

  4. mobile device capable of discreetly recording audio, video and still footage in public and private places. However, most security threats from mobile devices result from the manner in which the consumer uses the technology

  5. Users may unknowingly download malware disguised as a useful application.Out-of-date operating systems may pose threats. OS manufacturers periodically release security patches and fixes, but it is up to the consumer to update their devices.

  6. Older devices may not support new updates to the OS. Out-of-date software presents similar security risks. Attackers can exploit vulnerabilities in outdated software. Wireless transmissions are not always encrypted, making

  7. information sent via mobile devices easier to intercept. With users treating their devices in such a blasé fashion, it can be difficult and frustrating for IT specialists to help users avoid security

  8. and privacy mishaps—especially when those devices are used for company purposes. With users treating their devices in such a blasé fashion, it can be difficult and frustrating for IT

  9. specialists to help users avoid security and privacy mishaps—especially when those devices are used for company purposes. Mobile security or mobile phone security has become increasingly

  10. important in mobile computing. It is of particular concern as it relates to the security of personal information now stored on smart phones.

More Related