Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
How to Secure Your Smart Phone or Tablet: A Guide for Normal Users

Learning Outcomes

As part of the formal assessment for the programme you are required to submit a Computer Systems Security assessment. Please refer to your Student Handbook for full details of the programme assessment scheme and general information on preparing and submitting assignments.

Learning Outcomes:

After completing the module, you should be able to:

1. Demonstrate a conceptual understanding of common security risks and recognise the importance of risk analysis within different IT environments.

2. Demonstrate a systematic understanding of the key approaches to cryptography and their application

3. Critically evaluate relevant literature with regard to notable security issues.

4. Create a risk analysis for a given scenario with reference to compliance with security policies

5. Critically evaluate legal, social and ethical issues of secure systems.

Assignment Task

Smart phones and tablets are ubiquitous. The only significant difference between a smart phone and a tablet is (bizarrely) the ability to actually make a phone call, so for the purposes of this assignment, we shall consider smart phones and tablets as equivalent. Whether you are in a major city or half way up a remote mountain, everybody seems to have such a device. Access to the Internet via 3G/4G or Wi-Fi enables these devices to communicate and to run a vast range of apps covering almost every aspect of our lives. The most obvious uses include the “traditional” e-mail and web browsing, through maps and navigation to managing our bank accounts and making payments via both bank transfers and tap and pay facilities. We also store a lot of our lives on our phones. Photographs and videos, address books and contact lists, diaries, notes and so on all reside on our devices and we depend on our phones for this information.Whether it is finding the best local pizza, a video of your child’s first goal or paying your tax bill, all of these uses involve personal data which may be of use to those with criminal intent. Unfortunately, most users do not have the knowledge or skill to protect themselves from illegal access to their data. However, as an expert in Computer Systems Security, you do.

Task

Write a report explaining how to secure a new smart phone or tablet to a level suitable for a normal person.

For this assignment, the marks will be awarded as follows:

Detailed and accurate technical descriptions and explanations of security issues and their mitigations

Explanation of the relevance of the issues discussed to the specific scenario

Presentation of the report, structure, suitability for the target audience, references and citations, use of credible sources, appropriate use of correct English and technical terminology, including the correct spelling of technical terms such as Wi-Fi.

support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close