Wednesday, December 11, 2019

Windows Mobile Based Devices and Security †MyAssignmenthelp.com

Question: Discuss about the Windows Mobile Based Devices and Security. Answer: Introduction: Wireless Network came as a result of development of mobile IP address whose co-purpose was to break the barrier associated with the static IP that was then being used. A robust Adhoc network was require to solve the problem associated with continues reconfiguring of the IP address whenever a network node was in motion. Availability of mobile devices such as the laptops, cellular phones, smartphones and tablets brought about mobility, as such, there was urge to keep those devices connected to the network so as to facilitate easy and efficient communication among the mobile nodes. The rise of mobile Network brought with it wireless network that uses radio waves from the satellite to broadcast network wirelessly to these devices. Since these devices are not physically connected to the network, crimes that was never heard of came into existence. Anyone with malicious intentions could thus listens to the packets of the node and isolate the target node so as to listen to the communicating nodes with an intention to use that information for personal gain (Karygiannis and Owens 2010) . This kind of attack could lead to Identity theft through unauthorized access to someones personal information and later use that information to extort that person. Also it could lead to injection of malicious SQL code into a website with the purpose of gain access into an organizations database which can be fatal. As a result, measures are put in place to ensure that these kind of attacks will never have to occur if one adheres to the set rules and regulation. References Karygiannis, T., Owens, L. (2002). Wireless network security.NIST special publication,800, 48. Access through https://all.net/books/standards/NIST-CSRC/csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf Dedo, D. (2004). Windows mobile-based devices and security: Protecting sensitive business information.Microsoft Corporation Apr.retrieve from https://download.microsoft.com/documents/australia/security/summit/WhitePapers/Windows_Mobile-based_Devices_and_Security.doc

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.