With the increasingly ubiquitous nature of mobile devices and availability online, including smartphones and tablets, there is also understandable concern about the level of security afforded to such devices. This may be seen as increasingly important given the proliferation of policies such as BYOD (Bring Your Own Device) which is being used by several organizations as a way to reduce the cost of ownership of such devices while taking advantage of the flexibility benefits that their use can offer. Bring. It is therefore an area of immense interest due to the changing and emerging nature of both the technology itself and security concerns. Due to the sensitive and confidential information that may exist on such devices, it is imperative that security solutions and processes are implemented in order to protect and secure such content from the proliferation of threats and vulnerabilities that can affect mobile devices (Juniper Networks, n.d. ). Mobile devices are exposed to a record number of security threats with potentially alarming statistics indicating a 400% increase in Android Malware for example, while Wi-Fi connections are also increasingly being targeted. While conventional desktop PCs will continue to serve important functions at both the consumer and professional levels, mobile devices are expected to become the predominant form of accessing both personal and professional content. It is understandable that cybercriminals have started to focus on mobile devices. who at the same time have expanded their user base by essentially consolidating operating system variants, which makes the surface area for a potential attack substantially larger (...... middle of paper ......com/icloud /find-my-iphone.htmlhttp://www.google.com/android/devicemanagerSujithra, M. and Padmavathi, G. (2012 Mobile Device Security: A Survey of Mobile Device Threats, Vulnerabilities and Their Mechanism). defensive. International journal of computer applications. Sujithra, M. and Padmavathi, G. (2012). Threats, Vulnerabilities and Their Defensive Mechanism International Journal of Computer Applications. Abendan, G. (2013, August 8). from Trend Micro: http://blog.trendmicro.com/trendlabs-security-intelligence/exploiting-vulnerabilities-the-other-side-of-mobile-threats/Wright, J. (2014). Five Wireless Threats You May Not Know About Retrieved from SANS : http://www.sans.edu/research/security-laboratory/article/wireless-security-1
tags