This Article is About
mobile computing
security protocols
security types
computer device
video conferencing
physical aspects
The Race To Secure The Airwaves: Mobile Computing
Join 1000's of Authors at StreetArticles Today!

The Race to Secure the Airwaves: Mobile Computing

Almost every new computer device has voice recognition capabilities, which presents a whole new arena for securing data transmissions. The reality is that it's impossible to completely secure wireless transmissions. There are ways to hinder the attack process down and almost guarantee virtual security. There are the logical and physical aspects with logical being encryption and physical being vaults and passwords. So what is the best way to secure that transmission activated by voice, or sent entirely by wireless communications?

A combination of logical and physical security protocols is the best possible method available. One benefit to voice recognition is the key-logger method of attack seemingly vanquished by voice recognition. If the keys aren't being pressed then important information is safe, for the time being. This is another case of combining security types. If you type in your username and password, and then, speak an entire document with voice recognition, the door was opened when the password was typed. There is the dilemma of how to secure what is spoken because there are malware programs that can monitor the voice bandwidth section of the complete transmission.

This doesn't seem like such a big problem except almost every new computer has a built-in webcam, and what do most people do to connect with friends? Ah, the social networks. This is where your level of use or the type of activity you're transmitting comes into play. If it's personal use then not much risk is involved, but if your the CFO, video conferencing about your newest product upgrade to potential clients; it's a different story. I have some ideas about usernames/passwords and what they can actually unlock, but it's a programming feature that will have more research and an entire systems development life cycle in place, but it does involve tricking the enemy "malware" or Black Hatters.

There are a few things the common users can do with using physical and logical security, even in our smartphones, and that is make sure the WEP is activated and you know the password. If it's still ten zeros then it's a good idea to personalize it. Our places of work have their protocols in place, but with smartphones being small computers, more documents are being sent via cell technology and the absolute best way to protect the sensitive information is the combination of both physical (password protection) and logical (encryption) security until that perfect algorithm secures the airwaves.


Street Talk

No comments present
You May Also Like
Mobile Computing And Your World :set To Change Forever But Are You Set?
Are you still in that frame of mind where you are not able to decide whether to go ahead with the purchase of a device running on Windows 8 or to stay loyal to your irrepressively cute laptop even though it doesn't have a touch screen, or whether to go…
By: Biswadeep Banerjee in  Computers and Technology  >  Mobile Computing   Dec 09, 2012  
2
  Likes: 0

Trends In Mobile Computing
Mobile devices are now equipped with more sophisticated technology aspects which provide a variety of uses of a simple communication device. Mobile technology has evolved from being a simple communicator to a customizable equipment, having features both of a mobile device and a computer system. Mobile devices have had a…
By: Christa Joe in  Computers and Technology  >  Mobile Computing   Dec 12, 2012  
0
  Likes: 0

How to View Android Text Messages on Computer?
To keep android phone text messages stored longer, or make backups for them, or fulfill some other demands, people may want to read text messages on their computers. But reading SMS messages is quite different from viewing things stored in a storage card used by the cellphone. So many people…
By: eveeve in  Computers and Technology  >  Mobile Computing   Jun 07, 2016  
0
  Likes: 1

Well Used String Staying WOW Legion Gems Applied Next to One Thing Tough
To get to relieve some sort of heavy metal linen, wow legion Trade Goods you will require some sort of denture shear incisor. Shearing regarding alloys needs different instruction. While much time make use of, conventional lowering resources turn into dull. You ought to make certain that that a mower…
By: appgamenews in  Computers and Technology  >  Mobile Computing   Jun 03, 2016  
0
  Likes: 1

Basics Of OSI And Tcpip Layers
This article covers everything one like to know about networking basics including circuit switching vs packet switching, TCP/IP protocol fields, ARP/RARP protocol fields, what is IP address ,what is MAC address, networking devices which include hub, switch, bridge, router, gateway and firewall. In this section we will see OSI and…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 28, 2016  
0
  Likes: 1

Gsm: Global System for Mobile Communication
Mobile Tech: The GSM system is the most widely used cellular technology in use in the world today. It has been a particularly successful cellular phone technology for a variety of reasons including the ability to roam worldwide with the certainty of being able to be able to operate on…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 28, 2016  
0
  Likes: 0

Bypass Icloud Remove From Iphone Step By Step Tutorial Guide
By this guide you will learn step by step how to successfully do an iCloud Remove from your device using our generated Activation Codes. Bypass iCloud Activation Lock from iPhone. You will need for this the latest version of iTunes, and your locked device with debugging proxy. If you have…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 23, 2016  
0
  Likes: 0

Battery Extended Manually - Samsung Galaxy S7
I previously bought a different battery case that had button extenders for the volume and power button. They broke, so I bought this one that's thin enough it doesn't need those extra plastic pieces. I highly recommend it. It's a little annoying that after you press the power button to…
By: Maheen Sehar in  Computers and Technology  >  Mobile Computing   May 23, 2016  
0
  Likes: 1

Fix Itunes Error 17 When You Try to Upgrade Iphone/ipad
Technically, iTunes 17 is very similar to error 3194 even though the latter happens more often than the former. According to Apple’s support documents, Error 17 comes up when there is a connectivity issue. Fixing iTunes error 17 has a lot of similarities to fixing error 3194. But we’ll be…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 20, 2016  
0
  Likes: 0

Error Problems With the Ipad Air And Air 2
However, There’s very little to complain about with the iPad Air or the iPad Air 2. They are the best 10-inch tablets on the market right now, but true perfection is tough to achieve. But there are always a few bugs and flaws to deal with. We’ve gathered together the…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 20, 2016  
0
  Likes: 0

Things to Know Before Mobile App Development!
If you are having a good idea of developing a mobile app for your business, you must know how to build it. You must not ignore the facts that mobile industry is a fastest growing industry and a big competition has already been developed. Therefore, you must consider all the…
By: Approxen1 in  Computers and Technology  >  Mobile Computing   May 16, 2016  
0
  Likes: 0

Fix Error If You Can’t Activate Iphone Or Ipad After Installing Ios 93 Software Update
If you’ve updated to iOS 9.3 and you’re having trouble activating your iPhone or iPad, don’t worry. You’re not the only one with this problem, and fortunately, there are a couple of workarounds that should fix it. Here’s what you can try. The problem, which appears to be affecting a…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 28, 2016  
0
  Likes: 1

Standard Practices for Mobile App Development!
With the introduction in mobile devices, a new market has come into being. Mobile devices have become the best medium of communication and that is why everyone wants to own a mobile device rather than a laptop or desktop. Corporate industry and entrepreneurs have understood the importance of mobile devices…
By: Approxen1 in  Computers and Technology  >  Mobile Computing   May 14, 2016  
0
  Likes: 0

Icloud Bypass Activation Solution for Ios 931/932 Iphone 6s Plus,6s,6+,5,4s
New iCloud Bypass Activation Solution for iOS 9.3.1/9.3.2 iPhone 6s plus,6s,6+,5,4s model. There is a service provided by company called ChronUnlock that states the company will unlock your iPhone that has an iCloud issue with their iCloud Removal tool that will remove the Apple Activation Lock security feature for 24.95.…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 07, 2016  
0
  Likes: 0

Can't Remember Apple ID Or Password for Iphone
Forgetting the login and password to an Apple ID is not the best feeling in the world, particularly given how integral an Apple login is to the broader iOS and OS X experience. So, if you or someone else happens to forget an Apple ID or the password to an…
By: GBT365 in  Computers and Technology  >  Mobile Computing   May 07, 2016  
0
  Likes: 0

Article Views: 1807    Report this Article