Claim Missing Document
Check
Articles

Found 3 Documents
Search

Information Assurance in the Era of Mobility: Challenges and Solutions Amin, Mohammad Hasan; Neoaz, Nahid
BULLET : Jurnal Multidisiplin Ilmu Vol. 3 No. 5 (2024): BULLET : Jurnal Multidisiplin Ilmu
Publisher : CV. Multi Kreasi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With more family and organizational members using mobile devices within homes and workplaces, mobile device security particularly in regard to information security is an important question. The information assurance principles, secure mobile technologies, trends, threats, policies and compliance in mobile systems are presented in this article. These basic features including cryptos, MFA, MDM, and SC are part of the mobile security technologies explained in the paper. It also looks into how these latest trends, for instance 5G networks, IoT, mobile payment and AI app impact and offer opportunities as well as risks. Therefore, the article discusses policy regimes and compliance and the emergence of threats such as mobile malware, phishing, and ransom ware. However, it also proscribes comprehension of future opportunities and further evolutions in the sphere of mobile information assurance including the creation of Artificial Intelligence, quantum-safe encryption, and the international cooperation in order to overcome the new threats on the horizon. The mobile systems adopted by different systems and software may prone to several hacking attacks, although, through proper policies’ integration and up-to-date technologies, mobile systems security is feasible than in the advancing technology world.
Ensuring Information Integrity in a Mobile-Connected World Neoaz, Nahid; Amin, Mohammad Hasan
International Journal of Multidisciplinary Sciences and Arts Vol. 3 No. 4 (2024): International Journal of Multidisciplinary Sciences and Arts, Article October 2
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The sunlight adoption of portable devices in individual and business activity has made a higher urgency of appropriate mobile information assurance policies. This article explores key approaches to securing mobile devices and sensitive information, focusing on three major components: Mobile Device Management (MDM), mobile security best practices, mobile cloud computing. MDM solutions are ways through which organizations can gain control in mobile devices with secure policies, distant management, and compliance checks. In addition, best practices for the physical security of mobiles, which include the use of non-disclosed passwords, the enabling of the encrypt or and the use of virtual private networks or other such security tools go further in safeguarding mobile environments against elements like malware and intrusion. Besides, cloud computing supports portable information assurance by providing backup, recovery, and security measures like encryption, and ID confirmation. Solutions based on cloud technology allow to implement effective data sharing and processing, as well as to control data security and compliance with the requirements of existing legislation. Altogether, these measures constitute an integrated security strategy of mobile, it provides protection to sensitive data, makes them accessible, and help in managing or eradicating threats in the connected environment.
Ensuring Information Integrity in a Mobile-Connected World Neoaz, Nahid; Amin, Mohammad Hasan
International Journal of Multidisciplinary Sciences and Arts Vol. 3 No. 4 (2024): International Journal of Multidisciplinary Sciences and Arts, Article October 2
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/ijmdsa.v3i4.5299

Abstract

The sunlight adoption of portable devices in individual and business activity has made a higher urgency of appropriate mobile information assurance policies. This article explores key approaches to securing mobile devices and sensitive information, focusing on three major components: Mobile Device Management (MDM), mobile security best practices, mobile cloud computing. MDM solutions are ways through which organizations can gain control in mobile devices with secure policies, distant management, and compliance checks. In addition, best practices for the physical security of mobiles, which include the use of non-disclosed passwords, the enabling of the encrypt or and the use of virtual private networks or other such security tools go further in safeguarding mobile environments against elements like malware and intrusion. Besides, cloud computing supports portable information assurance by providing backup, recovery, and security measures like encryption, and ID confirmation. Solutions based on cloud technology allow to implement effective data sharing and processing, as well as to control data security and compliance with the requirements of existing legislation. Altogether, these measures constitute an integrated security strategy of mobile, it provides protection to sensitive data, makes them accessible, and help in managing or eradicating threats in the connected environment.