Information Security in the Age of Mobile Computing: A Look at the Evolution of Computing and the Efforts to Secure User Data

Contributed by Aaron Vanderbye

As our world has become increasingly digitally connected, we’ve seen tremendous growth in the wireless and mobile computing markets. With this growth has come an increased awareness in the need for advanced techniques to ensure the security of personal information making its way into “The Cloud.” This paper explores the history of computing and networking, and discusses some of the current and emerging technologies coming into use today, from smartphones and tablets, to console and handheld gaming systems and wearable fitness devices, and explores the ways engineers and manufacturers are building these devices with an eye toward keeping personal data and information secure. From encryption technologies and transmission methods used by wireless radios, to password and personal security best practices, this paper explores some of the ways users can ensure that their information remains secure in the age of mobile computing.

This document is in PDF format. To view it click here.

Rate this article: 
No votes yet