1
Impact of Mobile Devices on CyberSecurity
Jacqueline Williams
University of Maryland, Global Campus
WRTG 391: Advanced Research Writing
Professor Shelly Gussis
July 8, 2021
2
Impact of Mobile Devices on CyberSecurity
Introduction
Cybercrimes and cyber attacks have continued to gain popularity and prevail,
especially in this current age where most people have access to mobile phones and
computers, necessitating more stringent cybersecurity measures. However, while these
measures continue to be put in place, the general public, employees in companies, and
governments have a significant role in enabling and ensuring its success. This paper will
discuss how educating the general public and employees on cybersecurity and the protective
measures thereof at a personal, organizational and national level can help improve
cybersecurity.
Educating the General Public and Company Employees on CyberSecurity and
Protective Measures
With the constant global change and evolution, most people now own a mobile phone
and a computer or have access to one or both of them. Even children and minors have
constant access to these gadgets. While this is the case, most of these users are unaware of
their gullibility to cyber-attacks which often, are just a click or download away (Eustace
et.al., 2018). Admittedly, most people are not even aware of the functionalities of some apps
on their gadgets and the good or damage they could bring if one makes a slight mistake or
uses them mistakenly. Thus, it necessitates the general public to be well enlightened on
cybersecurity and protect themselves from cyber-attacks and cybercrimes.
About 42% of smartphone users are unaware of what their permission to apps means.
That is barely half of the population owning smartphones evidencing the high vulnerability to
cyber attacks. Thus, people need to be educated on the apps to permit, clearly understand
their permission to apps, the advantages, and the consequences. Additionally, sensitization of
the general public, particularly on know-how on which apps to download. It is an initiative
3
informed by the statistics that malware is encompassed in over 17% of applications used by
android users and that social media frauds totaling over 70% are spread manually (Eustace et
al., 2018). Education and sensitization of the general public can thus help reduce these
numbers and prevent most cyberattacks and cybercrimes.
On the other hand, companies can have strict measures against cyber-attacks while
their employees unknowingly create a loophole in their systems and pose to them the same
threat they are fighting. Similarly to the general public, employees are equally unaware of the
risks they pose to their companies and employers through their phones, laptops, and the
gadgets they use at work (Nee & Tu, 2018). On their unsecured devices, they use the
company’s systems and networks. However, the companies may not coerce their employees
to put security measures on their gadgets. Educating them rather on cybersecurity would thus
be more effective in preventing cyber-attacks and maximizing cybersecurity. Evaluating their
employees’ cybersecurity knowledge and protecting themselves against cybercrimes will help
the companies know the specific areas of concern to educate and sensitize their employees on
(Nee & Tu, 2018). As such, the companies will improve cybersecurity through the help of
their enlightened employees besides the measures it has put in place as a company and
employer to curb cyber attacks.
Mobile devices, smartphones, laptops, and other gadgets continue to flood the market
today. Consequently, the operating systems of these gadgets are equally countless and
diversified. Such include Symbian operating system by Nokia, Windows by Microsoft, IOS
operating system by Apple, Java Micro Edition, and Android by Google (Yesilyurt &
Yalman, 2016). As the numbers of these devices increase daily, cybersecurity risks continue
to increase, too, being facilitated by using some of these devices. Hence, the rate of mobile
devices uses correlates with the rate of cyberattacks. Most mobile users are clueless about
these, among many other operating systems, their functionalities, advantages, and
4
disadvantages. These mobile devices have vulnerabilities and weaknesses in their codes and
processes. For instance, 96% of mobile devices lack pre-installed security software. Also,
while Apple devices limit accessibility to some applications, android devices are
disadvantaged since the safety levels of applications have not been established by the google
play store. Android users are thus prone to hackers who get access to their data by bypassing
security systems. (Dawson et al., 2016). Unfortunately, these users can only report such
instances once they fall prey to cyber-attacks and the repercussions that come with them.
Hence, it is quite difficult for buyers to settle for and buy the right gadgets with the
right operating systems that suit their technological, communications, and personal needs.
Thus, creating awareness on how various operating systems contribute to cybersecurity
would equip individuals and company employees on the best and most secure mobile devices
to own and use (Yesilyurt & Yalman, 2016). Consequently, this would be paramount and
significantly helpful in fighting against cyber attacks and improving cybersecurity.
Interventions to Improve CyberSecurity at a National Level
The fight against cyber attacks and cyber crimes calls for intervention at the national
level too. Individuals and organizations can put all the necessary measures to improve
cybersecurity, but these measures cannot be fully effective without government support. The
governments have a significant role in implementing national cybersecurity standards
(Dawson et.al., 2016). Cybersecurity can be relative to different people and companies,
including the manufacturers of mobile devices. However, the government can harmonize this
and develop specific standards that all people and organizations will follow. As a result,
manufacturers of these mobile devices and their operating systems will have distinct
specifications to incorporate in those devices and operating systems.
Additionally, mobile devices users and particularly companies will understand the
specific measures to abide by, the security devices to buy, the secure apps to install, and the
5
insecure websites and applications that are a no-go zone. The national standards should also
be reviewed constantly and readjusted accordingly to effectively respond to the changing
forms and ways of cyber-attacks and cybercrimes. Times are constantly changing, and
criminals are devising new ways, methods, and manifestations of cyber crimes and attacks
daily.
The national cybersecurity standards will also control the accessibility to information,
and its sharing thereof since the availability of uncontrolled information has significantly
increased cybercrimes. While mobile devices cannot be limited, the information accessed and
shared can be regulated to improve cybersecurity. In addition, the national cybersecurity
standards will ensure that all devices, including mobile phones, laptops, and desktops, are
secure against cyber attacks (Dawson et al., 2016). Hence, people will be able to comfortably
use any of these devices, assured of their security, contrary to days back when people
considered mobile phones more secure than desktops for connectivity.
Conclusion
While mobile devices significantly impact cybersecurity, mobile devices users,
employees in companies, and the governments can also significantly reverse the otherwise
escalating cyberattacks and cybercrimes. Educating individuals and company employees on
cybersecurity and how to protect themselves and their companies against cyber attacks can
help improve cybersecurity. Being enlightened on the most secure devices to buy and use and
the secure apps to install and download will be of utmost help. Also, most importantly, it
would be crucial for the governments to implement national cybersecurity standards. As a
result, manufacturers will produce secure gadgets, and individuals and company employees
will have stringent and distinctively laid out cybersecurity measures to follow. The
manufacturers who will not comply with the national cybersecurity standards will face strong
competition from their competitors and will have to re-invent themselves to make sales of
6
secure mobile devices and gadgets. With that, cybersecurity will prevail, and people will
comfortably use mobile devices and gadgets without cyberattacks.
7
References
Dawson, M., Wright, J., & Omar, M. (2016). Mobile devices: The Case for Cyber Security
Hardened Systems. New Threats and Countermeasures in Digital Crime and Cyber
Terrorism, 8-29. doi:10.4018/978-1-4666-8345-7.ch002
Eustace, K., Islam, R., Tsang, P., & Fellows, G. (2018). Human factors, self-awareness, and
intervention approach in cybersecurity when using mobile devices and social
networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering, 166-181. doi:10.1007/978-3-319-78816-6_13
Nee, B. A., & Tu, M. (2018). The social, economic, environmental, human health, and
cybersecurity impacts of wireless and mobile computing. Journal of Communications,
32-39. doi:10.12720/jcm.13.1.32-39
Yesilyurt, M., & Yalman, Y. (2016). Security threats on mobile devices and their effects:
Estimations for the future. International Journal of Security and Its
Applications, 10(2), 13-26. doi:10.14257/ijsia.2016.10.2.02
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
There is a very low likelihood that you won’t like the paper.
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more