ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SECURE ENCRYPTED MOBILE : USER REQUIREMENT AND POLICY CONSTRAINTS

Journal: International Education and Research Journal (Vol.9, No. 3)

Publication Date:

Authors : ;

Page : 27-30

Keywords : SECURE ENCRYPTED MOBILE;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

There is no stop to technology, every day new tools or techniques are emerging, and with the increase in technologies and use of mobile devices, digital crimes are also increasing. Companies are starting to face an enormous amount of data loss. The world is run by technology and networks and it becomes important for everyone to understand that cyber security, company assets, or the individual's data are at risk without the protection added to it. The usage of business applications on mobile devices has become common to keep the production environment active. IT companies use updated technologies to protect their data, but attackers are always enhancing new techniques to break through these technologies. Cyber Security becomes important to make sure the assets, information/data, and personal or financial details are safeguarded and not at risk. This paper aims to review the threats and crimes involving mobile devices and discuss the requirement of secure mobile phones including policy constraints of various governments owing to posing significant challenges to public safety.

Last modified: 2023-04-24 20:28:48