This Article is About
acceptable risk
Security Challenges In Mobile - Tech And Acceptable Risk
Join 1000's of Authors at StreetArticles Today!

As an IT professional, it highly important to look into various security issues that faces the IT sectors today and the challenge that comes with it and suggestions on how to tackled or overcome this problems in the IT industries. In this article I will mention few aspect of security challenges in Information Technology e.g mobile device, WIFI network, cloud and the knowledge of what an acceptable risk is, this will be simplified by answering to the below questions:

What are the Biggest Challenges in Security at the Moment?

For network administrators (even before the mass usage of the internet) network security (prevention of external network attacks that could possibly cause damage, access or steal confidential information or data) has always been one of the most important and difficult issues.

I think the current situation with the constant advancements in information and communication technologies, which incorporate larger sections of society, brings increased security problems on a large scale that previously did not exist. Security breaches to information systems is another challenge and it increase at an incredible pace every day and as long as individual and social dependence on IT systems increase the risk of security breaches will keep increasing at the same rate.

More so, the rate of cyber crime almost doubles each year and I think this rate will continue to increase in line with the rapid growth in internet usage as it becomes more freely available and accessible in today`s technology.

Can we ever have good Security on Mobile Devices?

I think we can have good security but we will never and ever have full security on mobile devices, because, attacks to mobile devices will increase as the usage of such devices rises. Definitely, security measures are enhanced as well with technological advancements but on the other hand mass usage of mobile devices also increases user awareness and knowledge of such systems which that can possibly turns as a security risks. (IT expertise is no longer a specialized subject known by a few thousand people but by millions around the world and such knowledge is freely accessible with many experts being self taught.)

Similarly, mobile devices and technological systems are developed by people as are security measures. Therefore, there will always be the risk that such systems will be exposed to attacks by systems experts. While technological development increasing the user’s practicality and usability also it can expose them to threats from technical experts who explore and then exploits any system weaknesses. Therefore, develop technical knowledge can be used in both a useful and/or harmful ways.

However, cyber crimes increasing almost double by each year and it will keep increasing as internet usage raise. Therefore I think as long as technology keep developing and more people start using them (more people become an expert) mobile devices will be less secure every passing day.

Do Wi-Fi Networks need to be more secure?

Wireless Networks are just another type of network which is not fully safe like everything else in the IT world. In fact it can be very dangerous if some important elements are not taken into account. As wireless networks provide a connection to the internet from any location, there are more potential targets for hackers than other types of networks.

Certainly by taking some security measures such as changing password before start using it (many Wi-Fi access device and modem comes with default password which are easy to find.), restrict your access to your Wi-Fi network ( thus only reliable people that you allowed can use your network.), change your wireless network name, encrypt your wireless signals, Mac filtering (so only the specified devices can connect to your Wi-Fi network.), reduce the range of the Wireless Signal etc it is not very hard to make your wireless network more secure.

However after taking all those security measures which mostly stops others using your internet or taking control of your computer through your own wireless network, the questions that need to be asked here are "does our internet speed remain constant?”, “ are we experiencing delays while transferring or sending data or information?”,“can such delays affect our business?" etc.

I think as much as we make the network systems more secure it will be that much slower and that much less flexible.

What are the Main Challenges on Security within the Cloud?

Cloud computing provides computing resources on demand via a service provider rather than maintaining your own hardware or software environment. In another words, we don’t need to save data into our own computer hard disks anymore, instead of this we use enormous online servers. Imagine without carrying your laptop being able to access all of your personal data at any given moment, having the ability to organize and share data, photos, movies, contacts, e-mails, documents, etc. with your friends, family, or co-workers from any online source.

In addition to this there are several more advantages for companies when using cloud computing, such as reduced IT cost (costs of hardware and software), improved performance, instant update, unlimited storage capacity, enhanced integration between operating system, increased file format compatibility, enhanced data security. When we think about all these advantages, cloud computing become very attractive, however when we mention cloud computing before all of these advantages, the first question that appears in our mind is; is it secure? Of course cloud computing can be hacked, there is no unbreakable security system, but I think security within cloud computing can be much more than that companies can provide itself.

The main challenge here is; is there any guarantee that none of the cloud operators will have access to see our information or data? Definitely I believe that our information and/or data are better protected from hackers with cloud computing than anything we can provide ourselves. However, if I were the owner of a big company I would feel unsafe using cloud computing because there is no assurance that no one has the ability to obtain an encryption key and steal, damage, destroy or sell my companies’ information and data.

What is Acceptable Risk?

In everyday life, nothing that we are using or doing is fully secure. There is no guarantee that we are not going to die by a falling brick hitting us on the head while walking along the road or run over by a car while crossing the road etc (even though the chances are low these kind of accidents happen). Since, there is always a risk of dying, should we stop going outside? Of course not, as long as we take protective measures (such as checking right and left side of the road before crossing) there is no reason to stay at home. Therefore, although going outside has some risks, we can accept these as an acceptable risks.

Everybody defines their own acceptable risk levels. For instance some people refuse to travel by plane believing that the level of risk is not acceptable because of the danger of crashing and they prefer traveling my car even though it takes more time. However, the majority of people do not share this view and use planes knowing that statistically more people die on the road if you compare death rate between car accidents and aircraft crashes.

Also, there is always a risk from hackers while using information and communication technology systems but this does not mean we should stop using them as they make our life easier. As long as some security measures are taken (this can never be one hundred percent secure) we can keep continue using them.

As I said above, the level of acceptable risk is dependent on individual choices, this also applies to companies. Every company defines their own level of acceptable risk according to their needs. For example the use of cloud computing is seen by some companies as an acceptable risk (even though there is no guarantee that the cloud operators will not steal their information and sell it on to other companies) which protects them from hackers better than using other systems, with the added protection from losing information or data with the loss of laptops, external hard drives and data storage devices (Cloud computing also gives the user the opportunity to access all their data at any time from any online source). However, some companies believe that the use of cloud computing is not an acceptable level of risk that they will take and they prefer to use their own networks where they can protect their information by individual methods.


Street Talk

No comments present
You May Also Like
Forex Automatic Trading - The Insider's Guide To Forex Robot Traders
Forex automated trading is not a new idea, in fact it has been around for decades and has made billions of dollars in trading profits to date. The key difference is that in the past, Forex robot traders have been the well kept secret of billion dollar hedge funds and…
By: Thad B. in  Finance  >  Currency Trading   Feb 28, 2011  
0
  Likes: 0

Simple Guide On How To Properly Deal With Arthritis
For anyone who suffers from arthritis or gout, the daily pain involved makes arthritis a very important topic. Although there is a wealth of information available on the Internet, it is difficult to wade through the plethora of information to glean what's worthwhile. This article is meant to provide you…
By: Judith Allison in  Health and Fitness  >  Foot Health   Sep 25, 2013  
0
  Likes: 0

How to View Android Text Messages on Computer?
To keep android phone text messages stored longer, or make backups for them, or fulfill some other demands, people may want to read text messages on their computers. But reading SMS messages is quite different from viewing things stored in a storage card used by the cellphone. So many people…
By: eveeve in  Computers and Technology  >  Mobile Computing   Jun 07, 2016  
0
  Likes: 1

Well Used String Staying WOW Legion Gems Applied Next to One Thing Tough
To get to relieve some sort of heavy metal linen, wow legion Trade Goods you will require some sort of denture shear incisor. Shearing regarding alloys needs different instruction. While much time make use of, conventional lowering resources turn into dull. You ought to make certain that that a mower…
By: appgamenews in  Computers and Technology  >  Mobile Computing   Jun 03, 2016  
0
  Likes: 1

Basics Of OSI And Tcpip Layers
This article covers everything one like to know about networking basics including circuit switching vs packet switching, TCP/IP protocol fields, ARP/RARP protocol fields, what is IP address ,what is MAC address, networking devices which include hub, switch, bridge, router, gateway and firewall. In this section we will see OSI and…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 28, 2016  
0
  Likes: 1

Gsm: Global System for Mobile Communication
Mobile Tech: The GSM system is the most widely used cellular technology in use in the world today. It has been a particularly successful cellular phone technology for a variety of reasons including the ability to roam worldwide with the certainty of being able to be able to operate on…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 28, 2016  
0
  Likes: 0

Bypass Icloud Remove From Iphone Step By Step Tutorial Guide
By this guide you will learn step by step how to successfully do an iCloud Remove from your device using our generated Activation Codes. Bypass iCloud Activation Lock from iPhone. You will need for this the latest version of iTunes, and your locked device with debugging proxy. If you have…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 23, 2016  
0
  Likes: 0

Battery Extended Manually - Samsung Galaxy S7
I previously bought a different battery case that had button extenders for the volume and power button. They broke, so I bought this one that's thin enough it doesn't need those extra plastic pieces. I highly recommend it. It's a little annoying that after you press the power button to…
By: Maheen Sehar in  Computers and Technology  >  Mobile Computing   May 23, 2016  
0
  Likes: 1

Fix Itunes Error 17 When You Try to Upgrade Iphone/ipad
Technically, iTunes 17 is very similar to error 3194 even though the latter happens more often than the former. According to Apple’s support documents, Error 17 comes up when there is a connectivity issue. Fixing iTunes error 17 has a lot of similarities to fixing error 3194. But we’ll be…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 20, 2016  
0
  Likes: 0

Error Problems With the Ipad Air And Air 2
However, There’s very little to complain about with the iPad Air or the iPad Air 2. They are the best 10-inch tablets on the market right now, but true perfection is tough to achieve. But there are always a few bugs and flaws to deal with. We’ve gathered together the…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 20, 2016  
0
  Likes: 0

Things to Know Before Mobile App Development!
If you are having a good idea of developing a mobile app for your business, you must know how to build it. You must not ignore the facts that mobile industry is a fastest growing industry and a big competition has already been developed. Therefore, you must consider all the…
By: Approxen1 in  Computers and Technology  >  Mobile Computing   May 16, 2016  
0
  Likes: 0

Fix Error If You Can’t Activate Iphone Or Ipad After Installing Ios 93 Software Update
If you’ve updated to iOS 9.3 and you’re having trouble activating your iPhone or iPad, don’t worry. You’re not the only one with this problem, and fortunately, there are a couple of workarounds that should fix it. Here’s what you can try. The problem, which appears to be affecting a…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 28, 2016  
0
  Likes: 1

Standard Practices for Mobile App Development!
With the introduction in mobile devices, a new market has come into being. Mobile devices have become the best medium of communication and that is why everyone wants to own a mobile device rather than a laptop or desktop. Corporate industry and entrepreneurs have understood the importance of mobile devices…
By: Approxen1 in  Computers and Technology  >  Mobile Computing   May 14, 2016  
0
  Likes: 0

Icloud Bypass Activation Solution for Ios 931/932 Iphone 6s Plus,6s,6+,5,4s
New iCloud Bypass Activation Solution for iOS 9.3.1/9.3.2 iPhone 6s plus,6s,6+,5,4s model. There is a service provided by company called ChronUnlock that states the company will unlock your iPhone that has an iCloud issue with their iCloud Removal tool that will remove the Apple Activation Lock security feature for 24.95.…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 07, 2016  
0
  Likes: 0

Can't Remember Apple ID Or Password for Iphone
Forgetting the login and password to an Apple ID is not the best feeling in the world, particularly given how integral an Apple login is to the broader iOS and OS X experience. So, if you or someone else happens to forget an Apple ID or the password to an…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 07, 2016  
0
  Likes: 0

Article Views: 1684    Report this Article