Security Best Practices And Governance Essays Example
Type of paper: Essay
Topic: Telephone, Media, Phone, Mobile, Mobile Phones, Public, Conference, News
Pages: 1
Words: 275
Published: 2021/02/27
[Writer’s surname]
The news last week presented an important research that was discussed in the International Conference on Pervasive Commuting and Communication regarding prevention from cyber hackers who illicitly hack mobile phones.
They explained the threats to the smartphone users of being attacked by such malicious criminals and how easily they could be trapped by them. It is a common fact that people do not go in depth of the sources from where they download applications and taking advantage of such carelessness; the cyber hackers secretly attack mobile phone through hidden codes. Once the application is installed in the mobile phone, the malware can exploit it in various ways for example; they can know private information about the user or expensive phone calls can be made by the attacker without the knowledge of the user of mobile phone.
The research proved the dangers of such criminal act for rich and famous people and how they could be trapped for money and fame. They also anticipated this criminal offense to be the biggest future threat to everyone.
UAB explained their cyber security technique in the conference. They explained how their mechanism engaged natural hand gestures in protection against criminals and with the help of censors; the mobile phone can become an extremely safe device.
News media embraced the effort of UAB and considered it an important cyber security technique to stop cyber crimes. The news about the research and the conference was presented on television along with radios and magazines. Media gave hope to the public by presenting the statement by the UAB regarding the commercialization of the technology in the near future.
As for my opinion, I would advise the senior researchers of UAB to work effectively and quickly on this new method of cyber security and try to launch it as soon as possible for general public so that there could be an end to such heinous malware crimes. Moreover, they should make this technology affordable for the general public.
References
Pankowski, Jacob Mercer. "Corporate Cybersecurity Plans Must Evolve." National Defense 1 June 2013. Print.
"New Proposed Federal and New York State Cybersecurity and Data Privacy Initiatives." Mondaq Business Briefing 12 Feb. 2015. Web. 15 Apr. 2015. .
Freedman, Bradley. "Cyber-Risk Management Guidance from Financial Institution Regulators." Mondaq Business Briefing 13 Mar. 2015. Web. 15 Apr. 2015. .
- APA
- MLA
- Harvard
- Vancouver
- Chicago
- ASA
- IEEE
- AMA