In the modern world, the popularity of various mobile and portable devices is increasing. This trend creates a number of risks for companies. As employees tend to bring own devices to work and access corporate networks, the chances that corporate sensitive data are stolen or disclosed increase. According to the survey of IT security professionals, mobile devices present the highest risks for business security (Marston, 2015). Security concerns for mobile devices include device theft, data theft or data sniffing, presence of malware in mobile apps, trespassers’ unauthorized access to mobile devices, etc. (Marston, 2015).
The emerging technology that will have the biggest effect on telecommunications is Virtual Mobile Infrastructure (VMI). This approach addresses the problem of business risks associated with the use of mobile phones. VMI technology is based on hosting a mobile operating system in a remote location (i.e. in the cloud or in a data center). Devices establish a remote access to VMI and execute mobile apps remotely. The data transmission is performed using special protocols for optimizing mobile display. This technology allows organizations to ensure that mobile devices operate in a secure environment, to prevent data loss or data theft associated with the device, and to streamline mobile-related IT processes (Marston, 2015). Currently VMI has several disadvantages that should be addressed in the future: significant resource consumption and bandwidth consumption, performance issues on weaker devices.
Another security-solution for mobile
devices is app wrapping, also referred to as app virtualization. This
technology allows wrapping individual apps instead of hosting the whole
operating system remotely (as VMI does) (Marston, 2015). App wrapping allows
securing data transmission and data storage for specific apps. It also helps to
accelerate development of mobile applications, reduces risks of data loss or
theft, and prevents man-in-the-middle attacks (Marston, 2015). However, app
wrapping is still vulnerable to insecure user behaviors such as weak password,
unauthorized access of third parties to the device, etc.
References
Marston, J. (2015). Virtual Mobile Infrastructure: secure the data and apps, in lieu of the device. Network World. Retrieved from http://www.networkworld.com/article/2937789/mobile-security/virtual-mobile-infrastructure-secure-the-data-and-apps-in-lieu-of-the-device.html
The terms offer and acceptance. (2016, May 17). Retrieved from
"The terms offer and acceptance." freeessays.club, 17 May 2016.
freeessays.club (2016) The terms offer and acceptance [Online].Available at:
"The terms offer and acceptance." freeessays.club, 17 May 2016
"The terms offer and acceptance." freeessays.club, 17 May 2016
"The terms offer and acceptance." freeessays.club, 17 May 2016
"The terms offer and acceptance." freeessays.club, 17 May 2016