100% (1)
page:
3 pages/≈825 words
Sources:
10
Style:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 19.44
Topic:

Historical Perspective and Background of Mobile Security

Research Paper Instructions:

This is a paper about mobile security. What the instructor needs to write for me is:
Academic review of previous work in the literature:
*Provide a brief historical perspective and background
*Current trends in research & development
*Future research & development

Research Paper Sample Content Preview:

Mobile Security Paper
Student Name
Institutional Affiliation
Date
Mobile Security Paper
Background Information
Mobile use is increasing by the day as more people are becoming more tech-savvy. Today, more than 6.4 billion people own smartphones worldwide, and by 2022, mobile users are expected to be 7 billion (Stallings & Brown, 2017). Mobile phones have created seamless interactions and are a source of fun. However, as technology advances, hackers and intruders are becoming more brilliant at stealing information and advancing Denial of Service attacks (DOS) on mobile phones for selfish personal gains. In this vein, mobile security has come out as an important area worth consideration, particularly effective ways of making mobile devices secure and assuring users of personal and crucial information safety. This paper reviews literature about mobile security’s historical and perspective background, current trends in research and development, and future research and development.
Historical Perspective and Background of Mobile Security
Mobile security is overly related to network generations, including 5G, 4G, 3G, 2G, and 1G. Currently, the world is striving to adopt the 5G network, which is presumed to have robust security that emphasizes the need to address authorization, authentication, eavesdropping encryption, and cloning problems experienced from earlier networks (Wang et al., 2020). Each network generation had its unique security challenges. For example, fourth-generation networks experienced security threats arising from wireless application execution. Common cases comprise malware applications (e.g., viruses) and media access control (MAC) layer security threats (e.g., DOS and eavesdropping).
On the contrary, the fifth network generation experienced security challenges, access networks, and backhaul (Dai, Zheng, and Zhang, 2019). Xi et al. (2019), on the other hand, contend that the fifth-generation network (5G) has security threats categorized into cloud computing threats, Network Function Virtualization (NFV), and Software-Defined Networking (SDN), and cyberwar threats. The sixth-generation (6G) network is in the conceptualization stage, with novel research highlighting it as a game-changer in mobile security. Osanaiye et al. (2017) believe that this network generation is powerful because of its additional link with intelligence characterized by ML/AI technologies. Nevertheless, integrating 6G and AI may also come out as a double-edged sword in several instances when protecting the privacy and security of a mobile user is concerned. Accordingly, Nagarjun and Ahamad (2018) noted that mobile phones form a critical part of daily human life. In that way, the increase in mobile devices’ usage creates a heightened scope of vulnerability as attackers are increasingly aimed at stealing sensitive data and conducting other kinds of malicious activities on these devices (Nagarjun & Ahamad, 2018).
Current Trends in Research and Training
The quantum leap functionality is increasingly gaining its usefulness in smartphone functionality. In this vein, many studies have been devoted to studying the effective use of quantum in guaranteeing mobile security. He, Chan, and Guizani (2015) concede that smartphones are attractive because of its massive number of apps to download and interact with. However, these applications are also an avenue for hackers to distribute malware and launch several attacks. This issue is envisioned to be addressed by having preventive approaches and effective detection strategies. He, Chan, and Guizani’s (2015) article offers an overview of the prevailing reasons that...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!