NIGERIAN JOURNAL OF SCIENCE AND ENVIRONMENT
Journal of the Faculties of Science and Agriculture, Delta State University, Abraka, Nigeria
ISSN: 1119-9008
DOI: 10.5987/UJ-NJSE
Email: njse@universityjournals.org
ENHANCING SECURITY IN MOBILE COMPUTING DEVICES
DOI: 10.5987/UJ-NJSE.16.033.2 | Article Number: 4E334627 | Vol.12 (2) - September 2013
Authors: Ojeme B.O and Odabi Odabi I
Increasingly, societies and nations --- far and near --- and economies are highly dependent on information and information infrastructure for survival, enhancing service delivery efficiency and increasing productivity. Security threats or not, there’s no denying that networks have become integral to how the general work force operates in the digital age. The devices give workers the ability to be more efficient without being constrained by the physical boundaries of the office. With all the added capabilities of mobile computing devices comes a rapidly growing security threat that experts say appear a little more advanced and aggressive. News reports on data leakage have become a regular feature and cause huge embarrassment to organizations, impacting their image and damaging the relationship with customers. This paper looked at modern preventive and management security measures to secure company data and protect mobile computing devices, without decreasing employee flexibility and business productivity.
Avinash, K. (2012). Lecture Notes on Computer
and Network Security: Classical
Encryption Techniques. Purdue University,
West Lafayette.
CISCO systems (2001). Beginner’s guide to
Network Security, Cisco Systems, Incorporated,
San Jose.
Scarfone, K. and Mell, P. (2007). Guide to
Intrusion Detection and Prevention Systems
(IDPS). Recommendations of the
National Institute of Standards and Technology
(NIST special publication).
Gaithersburg, MD 20899-8930
Kartik, K (2004). Project Report on Hackers:
Detection and Prevention obtained from
www4.ncsu.edu/-kksivara/sfwr4c03/
projects
La Polla, M., Martinelli, F. and Sgandurra,
D. (2013). A Survey on Security for Mobile
Devices. IEEE Communications Surveys
& Tutorials 15 (1): 446-471
Masoud N., Ronak, K. and Hojat, A. H.
(2012). Mobile Computing: Principles,
Devices and Operating Systems. World
Applied Programming 2 (7): 399-408
Souppaya, M and Scarfone, K. (2012).
Guidelines for Managing and Securing
Mobile Devices in the Enterprise. National
Institute of Standards and Technology
(NIST) special publication
Randy, K. (1996). Challenges of Mobile
Computing. Computer Science Division,
University of California, Berkeley.
Yap, R. (2005). Home and business user computer
security conference proceedings on
Compendium on Information Network
Security, (MCMC, 2005). Pp 19-26. Ixaris
Sdn Bhd, Malaysia
Wikipedia, The Free Encyclopedia, (2004).
[Online] Available at: http://
en.wikipedia.org/wiki/Hacker