SECURE ENCRYPTED MOBILE : USER REQUIREMENT AND POLICY CONSTRAINTS
Journal: International Education and Research Journal (Vol.9, No. 3)Publication Date: 2023-03-15
Authors : AYAN DHANDA;
Page : 27-30
Keywords : SECURE ENCRYPTED MOBILE;
Abstract
There is no stop to technology, every day new tools or techniques are emerging, and with the increase in technologies and use of mobile devices, digital crimes are also increasing. Companies are starting to face an enormous amount of data loss. The world is run by technology and networks and it becomes important for everyone to understand that cyber security, company assets, or the individual's data are at risk without the protection added to it. The usage of business applications on mobile devices has become common to keep the production environment active. IT companies use updated technologies to protect their data, but attackers are always enhancing new techniques to break through these technologies. Cyber Security becomes important to make sure the assets, information/data, and personal or financial details are safeguarded and not at risk. This paper aims to review the threats and crimes involving mobile devices and discuss the requirement of secure mobile phones including policy constraints of various governments owing to posing significant challenges to public safety.
Other Latest Articles
- ONLINE TEACHING- LEARNING PRACTICES DURING PANDEMIC: A PERCEPTION OF STUDENTS AND TEACHERS OF B. ED PROGRAMME
- THE CONCEPT OF LAW AND DHARMA AND IT’S RELEVANCE IN INDIAN JURISPRUDENCE
- MEMORY ALTERATION
- A LITERATURE REVIEW OF THE EFFECTS OF EMOTIONAL VALENCE AND AROUSAL ON MEMORY, WITH A FOCUS ON THE RECOLLECTION OF EMOTIONAL EVENTS
- ART USING COLOR IN RELATION TO EMOTIONS
Last modified: 2023-04-24 20:28:48