Reference Hub1
Importance of Information Security and Strategies to Prevent Data Breaches in Mobile Devices

Importance of Information Security and Strategies to Prevent Data Breaches in Mobile Devices

Maulik Desai, Swati Jaiswal
ISBN13: 9781799810056|ISBN10: 1799810054|ISBN13 Softcover: 9781799810063|EISBN13: 9781799810070
DOI: 10.4018/978-1-7998-1005-6.ch015
Cite Chapter Cite Chapter

MLA

Desai, Maulik, and Swati Jaiswal. "Importance of Information Security and Strategies to Prevent Data Breaches in Mobile Devices." Improving Business Performance Through Innovation in the Digital Economy, edited by Ionica Oncioiu, IGI Global, 2020, pp. 215-225. https://doi.org/10.4018/978-1-7998-1005-6.ch015

APA

Desai, M. & Jaiswal, S. (2020). Importance of Information Security and Strategies to Prevent Data Breaches in Mobile Devices. In I. Oncioiu (Ed.), Improving Business Performance Through Innovation in the Digital Economy (pp. 215-225). IGI Global. https://doi.org/10.4018/978-1-7998-1005-6.ch015

Chicago

Desai, Maulik, and Swati Jaiswal. "Importance of Information Security and Strategies to Prevent Data Breaches in Mobile Devices." In Improving Business Performance Through Innovation in the Digital Economy, edited by Ionica Oncioiu, 215-225. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-1005-6.ch015

Export Reference

Mendeley
Favorite

Abstract

Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.