.

Sunday, June 23, 2019

Security in New Generation Cell Phones Research Paper

Security in New Generation Cell Phones - Research Paper Example engineering science in every new generation provides study improvements from the previous generations. In the cellular communications, there was first the 1G and 2G generations. These generations contributed to the provision of the internet for the wandering phones through the 3G reign the scene. The third generation cell phone internet had advancements that made it stand up from the earlier versions of 1G and 2G. The 3G had the capacity to converge voice and the data with the wireless internet. This makes it worthy for transmitting data in high quantities. Additionally, migration towards the 4G technology has been witnessed. Regardless of these processes and developments, the security of cell phone remains paramount. Ensuring the security of the cell phones The continuity in the manufacturing and dissemination of cell phones leads to the rise in the security risks in different ways. Users of electronic gadgets like cell phones should be more concerned about their safety. Lately, electronic devices such(prenominal) as the Apples iPhone latest version and the Googles Android have committed themselves to the manufacturing and development of cell phones with 3G networks so that they possess the same features and functions of computers. Although this promotes huge conveniences, it also comes with severe security risks. Both the new and future generations of cell phones require the setting up and update of security software. This software includes firewalls, anti-virus software, operating dodge patches, anti-spam software, file encryption, and the anti-spyware software. This requires the observance of the basic home computer internet safety and guidelines. The revolution in the field of cultivation technology has enabled most financial institutions to contract mobile banking technologies to enlarge their customer bases. Cell phones users are required to conduct their business and financial trans actions online. As a result, they will need to repositing their login passwords with the information pertaining to their credit card and personal details. With this trend, there will be more cases of online fraud, identity theft, more spam, digital forgery, data theft, and any other cyber crimes. Besides, it derriere also lead to the denial of disseminated service attack. This has the risk of disabling the network service supplier. Additionally, cell phones are prone to theft based on their portability compared to backdrop computers. Since most theft cases occur unexpectedly, a cell phone user can lose a lot of information and data stored in the mobile device. In the event that the mobile device contains business and financial information of the user, the thief can use it to defraud the user of his or her finances. This is a major security concern. Additionally, the new generation cell phones come with applications that display the users location and movements. One such applicati on is the opt-in text advertisements that give information on the whereabouts of the user round the clock. Hacker stalkers can use this information to trail their victims and even do felony acts to them.

No comments:

Post a Comment