Abstract

Abstract: It has been well recorded and is widely recognized worldwide that the usage of mobile devices to perform government business has expanded over the previous 15 years. Threat actors are consequently increasingly focusing on mobile devices and the mobile infrastructure environment in order to look for opportunities for malicious exploitation that could hurt or damage the reputation of government agencies and Enterprise as well. The various protocols, standards, techniques, and systems that are available determine the security measures that are taken. An overview of security procedures, standards, and related technologies is provided. The high-capacity wired and wireless broadband network serves as the foundation for the working environment. The main study areas, current projects, and services on offer are discussed. The future information society is the focus of all endeavors. In order to help organizations create an enterprise-wide mobile security strategy and policy, this paper explains the security features of the mobile security management ecosystem like products, tools, technologies and services. We have talked about how mobile phone services are protected from dangers to information security from the standpoint of developers. Mobile Internet usage has grown, and with it, threats against mobile phones and the services they offer. On the other hand, various rapacious software or attackers are attempting to target these services.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call