The use of mobile devices is prevalent and growing rapidly as users heavily depend on them . Unfortunately , attackers follow the money and user population . In addition , mobile devices do not receive patches for their vulnerabilities . The Zeus-in-the- Mobile ( ZitMo ) attack against Android users is an example defeating the emerging technology to steal user ’ s credentials and ultimately money . Mobile devices can also spread malware .
Read the article titled , “ Mobile device attacks surge ”, located at http :// www . treasuryandrisk . com / 2011 / 02 / 08 / pr-mobile-deviceattacks-surge , and FIPS 140-2 Security Policy , located at http :// csrc . nist . gov / groups / STM / cmvp / documents / 140- 1 / 140sp / 140sp1648 . pdf . In addition , read the report titled , “ Emerging Cyber Threats 2012 ”, located at http :// www . gtisc . gatech . edu / doc / emerging _ cyber _ threats _ report 2012 . pdf .
Write a five to eight ( 5-8 ) page paper in which you :
1 . Describe the emerging cybersecurity issues and vulnerabilities presented in the “ Emerging Cyber Threats 2012 ” report .
2 . Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices .
Due Week 7 and worth 100 points
The use of mobile devices is prevalent and growing rapidly as users heavily depend on them . Unfortunately , attackers follow the money and user population . In addition , mobile devices do not receive patches for their vulnerabilities . The Zeus-in-the- Mobile ( ZitMo ) attack against Android users is an example defeating the emerging technology to steal user ’ s credentials and ultimately money . Mobile devices can also spread malware .
Read the article titled , “ Mobile device attacks surge ”, located at http :// www . treasuryandrisk . com / 2011 / 02 / 08 / pr-mobile-deviceattacks-surge , and FIPS 140-2 Security Policy , located at http :// csrc . nist . gov / groups / STM / cmvp / documents / 140- 1 / 140sp / 140sp1648 . pdf . In addition , read the report titled , “ Emerging Cyber Threats 2012 ”, located at http :// www . gtisc . gatech . edu / doc / emerging _ cyber _ threats _ report 2012 . pdf .
Write a five to eight ( 5-8 ) page paper in which you :
1 . Describe the emerging cybersecurity issues and vulnerabilities presented in the “ Emerging Cyber Threats 2012 ” report .
2 . Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices .