Chat with us, powered by LiveChat A project that involves research and/or implementation on a network security tool, exploit, or security software. Provide research on the project showing implementation of such tool/software/e | Wridemy

A project that involves research and/or implementation on a network security tool, exploit, or security software. Provide research on the project showing implementation of such tool/software/e

  

Final Project Options:

1. A project that involves research and/or implementation on a network security tool,

exploit, or security software. Provide research on the project showing implementation of

such tool/software/exploit and provide documentation for the outcome. The

documentation/research/testing analysis will need to be a minimum of 2000 words and

include screenshots or video capture of your project in action. If you submit a walkthrough

video for this portion of the project, you can use a screen capture tool and voice

over your presentation.

2. A detailed research paper that is related to one or more topics covered in the textbook.

The research paper will need to be a minimum of 2,000 words (not including title page

and references). A minimum of three library sources is required.

3. A case study involving your own industry experience and/or industry experiences of

others where security measures or best practices have been applied to create a more

secured network environment. The subject must be related to one or more topics covered

in this course, and library sources must be carefully cited. A minimum of three library

sources is required.

• All project papers will need to be a minimum of 2000 words.

4

Cyber Security

Student Name

Course

Let me know Date

Project Title: Cybersecurity and Mobile Applications

Introduction

Computer security and mobility have developed significantly over the last decade, affecting information technology in a significant way. As a result of a hacker being able to access news account services in 2013, US stocks plunged precipitously. Further, the hacker caused a series of explosions at the White House, which hurt President Obama. Thankfully, no serious damage was caused to the stocks because of the media officials' quick response to this matter. A perfect illustration of the need for strict measures in the future system to counter such types of attacks (Dennis et al., 2020). Governments and modern companies are increasingly concerned about cyber security being a major threat. Meanwhile, security firms stand to benefit greatly from it.

Because cell phone technology is constantly advancing, cybercriminals are taking extreme measures to hack users by tricking them into thinking they are legitimate organizations that can be trusted and instead taking advantage of their innocence. A number of advances in mobile technology and related innovation are driving phenomenal versatility, increasing portable broadband memberships, and increasing mobile phone reliance among users. As of 2019, portable brand organizations have increased by more than 850%. According to Bubukayr and Almaiah, this is more important than the number of broadband subscribers. Even though cybercrime is on the rise, mobile phones have become a hub connecting people and businesses from a variety of backgrounds. Even though these devices are highly vulnerable, they still have a sophisticated plan and surge in usefulness. The paper discusses the impact of mobile devices in the presence of cyber security.

Project Scope

Research articles providing information on the topic will be used to gather information from secondary resources. Government information, ACM Digital library, and computer science databases will be used to retrieve articles from 2017 to 2022. Keywords for the research will include cyber security, mobile devices, users, threats, and opportunities. Research will be conducted in the following areas. We will discuss cyberattacks on mobile devices in the first section, mobile and cyber security issues in the second, and the threat mobile users face in the digital world in the third. The fourth section will provide recommendations that can be utilized to mitigate the issue by empowering cyber security in the mobile application.

Conclusion

With the rapid advancement of mobile device technology, it is clear that the world is facing a cyber-security crisis that threatens to escalate. Mobile workforces further exacerbate cyber security threats. This study found that corporate employees and the corporate world need to be educated on the underlying threat of cyber security. To protect themselves against the manipulative world of cyber criminals, mobile users must also be able to rely on robust induction techniques to educate them about existing cyber security services.

References

Bubukayr, M. A. S., & Almaiah, M. A. (2021, July). Cybersecurity concerns in smart-phones and applications: A survey. In  2021 International Conference on Information Technology (ICIT) (pp. 725-731). IEEE.

Dennis, K., Alibayev, M., Barbeau, S. J., & Ligatti, J. (2020). Cybersecurity vulnerabilities in mobile fare payment applications: a case study.  Transportation Research Record2674(11), 616-624.

Completing the Project Paper

Please use the information below to complete the paperwork above

Paper format: 2000 words minimum; 1.5 spacing; separate title page including name, title, and

date; page numbers; if any in-text citations and works cited in APA form.

Final Project Options:

1. A project that involves research and/or implementation on a network security tool,

exploit, or security software. Provide research on the project showing implementation of

such tool/software/exploit and provide documentation for the outcome. The

documentation/research/testing analysis will need to be a minimum of 2000 words and

include screenshots or video capture of your project in action. If you submit a walkthrough

video for this portion of the project, you can use a screen capture tool and voice

over your presentation.

2. A detailed research paper that is related to one or more topics covered in the textbook.

The research paper will need to be a minimum of 2,000 words (not including title page

and references). A minimum of three library sources is required.

3. A case study involving your own industry experience and/or industry experiences of

others where security measures or best practices have been applied to create a more

secured network environment. The subject must be related to one or more topics covered

in this course, and library sources must be carefully cited. A minimum of three library

sources is required.

• All project papers will need to be a minimum of 2000 words.

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Wridemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order

Related Tags

Academic APA Writing College Course Discussion Management English Finance General Graduate History Information Justify Literature MLA