Monday, November 4, 2019

Security in New Generation Cell Phones Research Paper

Security in New Generation Cell Phones - Research Paper Example Technology in every new generation provides major improvements from the previous generations. In the cellular communications, there was first the 1G and 2G generations. These generations contributed to the provision of the internet for the mobile phones through the 3G dominated the scene. The third generation cell phone internet had advancements that made it stand up from the earlier versions of 1G and 2G. The 3G had the capacity to converge voice and the data with the wireless internet. This makes it suitable for transmitting data in high quantities. Additionally, migration towards the 4G technology has been witnessed. Regardless of these processes and developments, the security of cell phone remains paramount. Ensuring the security of the cell phones The continuity in the manufacturing and distribution of cell phones leads to the rise in the security risks in different ways. Users of electronic gadgets like cell phones should be more concerned about their safety. Lately, electronic devices such as the Apple’s iPhone latest version and the Google’s Android have committed themselves to the manufacturing and development of cell phones with 3G networks so that they possess the same features and functions of computers. Although this promotes great conveniences, it also comes with severe security risks. Both the new and future generations of cell phones require the setting up and update of security software. This software includes firewalls, anti-virus software, operating system patches, anti-spam software, file encryption, and the anti-spyware software. This requires the observance of the basic home computer internet safety and guidelines. The revolution in the field of information technology has enabled most financial institutions to adopt mobile banking technologies to enlarge their customer bases. Cell phones users are required to conduct their business and financial transactions online. As a result, they will need to store their login passwords w ith the information pertaining to their credit card and personal details. With this trend, there will be more cases of online fraud, identity theft, more spam, digital forgery, data theft, and any other cyber crimes. Besides, it can also lead to the denial of disseminated service attack. This has the risk of disabling the network service supplier. Additionally, cell phones are prone to theft based on their portability compared to desktop computers. Since most theft cases occur unexpectedly, a cell phone user can lose a lot of information and data stored in the mobile device. In the event that the mobile device contains business and financial information of the user, the thief can use it to defraud the user of his or her finances. This is a major security concern. Additionally, the new generation cell phones come with applications that display the user’s location and movements. One such application is the opt-in text advertisements that give information on the whereabouts of t he user round the clock. Hacker stalkers can use this information to trail their victims and even do felony acts to them.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.