NIGERIAN JOURNAL OF SCIENCE AND ENVIRONMENT
Journal of the Faculties of Science and Agriculture, Delta State University, Abraka, Nigeria

ISSN: 1119-9008
DOI: 10.5987/UJ-NJSE
Email: njse@universityjournals.org


ENHANCING SECURITY IN MOBILE COMPUTING DEVICES

DOI: 10.5987/UJ-NJSE.16.033.2   |   Article Number: 4E334627   |   Vol.12 (2) - September 2013

Authors:  Ojeme B.O and Odabi Odabi I

Increasingly, societies and nations --- far and near --- and economies are highly dependent on information and information infrastructure for survival, enhancing service delivery efficiency and increasing productivity. Security threats or not, there’s no denying that networks have become integral to how the general work force operates in the digital age. The devices give workers the ability to be more efficient without being constrained by the physical boundaries of the office. With all the added capabilities of mobile computing devices comes a rapidly growing security threat that experts say appear a little more advanced and aggressive. News reports on data leakage have become a regular feature and cause huge embarrassment to organizations, impacting their image and damaging the relationship with customers. This paper looked at modern preventive and management security measures to secure company data and protect mobile computing devices, without decreasing employee flexibility and business productivity.

Avinash, K. (2012). Lecture Notes on Computer

and Network Security: Classical

Encryption Techniques. Purdue University,

West Lafayette.

CISCO systems (2001). Beginner’s guide to

Network Security, Cisco Systems, Incorporated,

San Jose.

Scarfone, K. and Mell, P. (2007). Guide to

Intrusion Detection and Prevention Systems

(IDPS). Recommendations of the

National Institute of Standards and Technology

(NIST special publication).

Gaithersburg, MD 20899-8930

Kartik, K (2004). Project Report on Hackers:

Detection and Prevention obtained from

www4.ncsu.edu/-kksivara/sfwr4c03/

projects

La Polla, M., Martinelli, F. and Sgandurra,

D. (2013). A Survey on Security for Mobile

Devices. IEEE Communications Surveys

& Tutorials 15 (1): 446-471

Masoud N., Ronak, K. and Hojat, A. H.

(2012). Mobile Computing: Principles,

Devices and Operating Systems. World

Applied Programming 2 (7): 399-408

Souppaya, M and Scarfone, K. (2012).

Guidelines for Managing and Securing

Mobile Devices in the Enterprise. National

Institute of Standards and Technology

(NIST) special publication

Randy, K. (1996). Challenges of Mobile

Computing. Computer Science Division,

University of California, Berkeley.

Yap, R. (2005). Home and business user computer

security conference proceedings on

Compendium on Information Network

Security, (MCMC, 2005). Pp 19-26. Ixaris

Sdn Bhd, Malaysia

Wikipedia, The Free Encyclopedia, (2004).

[Online] Available at: http://

en.wikipedia.org/wiki/Hacker