Sunday, February 16, 2020

Security in Bluetooth and other Mobile Devices Assignment

Security in Bluetooth and other Mobile Devices - Assignment Example "Mobile devices  are attractive targets because they are well connected, often incorporating various means of  wireless  communications." (Zhang, 2008) These mobile phones can be the entity of the person or of the organization whose information has to be accessed. The only problem with a mobile device or blue tooth is that it is not as secure as other devices like laptops as it is not provided with hardware based roots of trust therefore the information or the data stored in these mobile phones can be easily accessed by the process of jailbreaking or rooting. The issues that arise due to the inefficiency and the lack of security encountered by mobile phone devices are not so extreme and can be countered if effective measures are taken to overcome the security threats that persist. "New research reveals 68 percent of mobile device owners who have not adopted financial apps are holding back due to security fear." (Software Immune System). The reason why these mobile phones are no t reliable because android phones can be easily hacked and iPhone was hacked before it even released raising a doubt about their security in the minds of all. The industry which I will take into consideration is banking because of the increasing security threats that are associated to it because of the use of mobile devices.The problem arises as only a limited number of people take time out to secure their phones while the rest leave them accessible to harmful software and hackers. Many users these days get their mobile phones jailbreaked or rooted so that they can have access to millions of apps available unaware of the fact that these apps can damage the security of the phone making it prone to malfunctioning. These phones which lack security increase problems for banks and other finance sector as theycannot limit access of the users to such applications, mobile devices or how the user utilizes the mobile phone. In order to keep mobile devices secure banks need to take initiates o n their own so that the integrity of the bank. Banks need to realize that these mobile devices provide an aggressive setting and those applications enabled on the phone are unsafe therefore banks need to take preventive measures on their own and not rely on their customers.Banks and designers who design software are aware of the ongoing security threat in their minds therefore 'public key cryptography' is ensured so that security remains intact but this is just not enough. Hackers and software designed to disrupt the system can alter the functioning of the applications. These have the capability to change the account numbers, bringing changes to accounts, starting false dealings, saving passwords and pin codes etc.more actions are needed so that secure the apps available on mobile phones whereas it is essential to take preventive security measures increasing the communication protocols.(Ahonen, 2008) The five steps that banks can take to ensure security are as follows. Firstly, in o rder to suspect and find out rare and unintentional activities that happens in the bank end through the means of "risk-based authentication and anomaly detection". Secondly to provide the mobile devices with entrusted applications this can comprise of various security structures. Thirdly banks can incorporate another device that can maintain the security adding more to the capability of the smartphone itself known as"Out-of-band authentication". Fourthly, by integrating

Sunday, February 2, 2020

Cochlear implants and the debate within the deaf community. Arguing Research Paper

Cochlear implants and the debate within the deaf community. Arguing that cochlear implants have been beneficial for the deaf community - Research Paper Example The external components of the implant contains a microphone that is to be worn behind the ear of the patient, attached to a magnetic transmitter, which is attached to the earpiece and a sound processor. Once the implantation is complete, an audiologist uses a computer to set the speech processor for the patient. The audiologist sets the processor and programmes it to the appropriate levels of auditory stimulation between sound received from environment and brain nerve cells (Cochlear 1; Ouellette 1248). Once the processor is set, the microphone receives sounds from the environment and sends it to the speech processor, which then performs computation, and transforms the sound to electrical codes and digital format. The digital codes are sent to the outer ear component as coded signals bypassing the ear hairs. The magnetic transformer behind the ear then takes these codes, transforms them to electrodes arrays, and interfaces them to the cochlea. Then the internal device in the cochlea takes these arrays and stimulates the auditory nerves fibers that are connected to the brain, whereby the arrays are sent by the auditory nerve of the person to the brain for interpretation (Cochlear 1). This paper seeks to establish that cochlear implants technology is beneficial to the deaf community despite their opposition to the implants during their inception. In order to alleviate fears of the deaf community there have been improvements in cochlea implants technology over time and hence increased rate of success to patients who have undergone the procedure. Ideally, the procedure is meant to be applied to infants born deaf or those who have developed deafness in their early days. This is because cognitive development of a child into their senses and environment occurs between the ages of 0-3 years. Hence, if the procedure is undertaken during this