Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Im doing a research project on mobile security and Im trying to bring upon more awareness of cyber attacks. Im also trying to signify the

Im doing a research project on mobile security and Im trying to bring upon more awareness of cyber attacks. Im also trying to signify the importance of strong mobile security practices to protect mobile devices. In my mythology portion of my research, Im formulating a survey that aims to study the knowledge of mobile user's awareness of cyber attacks and moble security protection solutions. Another survey will be conducted upon representatives that utilize mobile devices to operate. Im also conducting an experiment on the integrity of a variety of mobile devices. Ill post the questions and expetiment questions and guidlines.
Name and thoroughly explain multiple methods of how I can implement my surveys and experiment to get groundbreaking results. image text in transcribed
image text in transcribed
For mobile users, survey questions will look like: 1) Do you make use of anti-virus protection apps? 2) Do you connect to public WIFI networks on your mobile device when you are in a public space? 3) Do you download third party applications on to your device? 4) Do you utilize strong password locks for your device and apps? 5) How do you know if apps are safe? 6) Have you ever experienced a cyber-attack? If so, how was the case handled? For representatives of corporations, survey questions will look like: 1) Does your business utilize mobile devices and their applications for daily operations? 2) If so, how many cybersecurity specialists are employed to maintain the security of your mobile devices and their networks? 3) How many security entities is your business partnered with? 4) What is your business's plan for handling cyber-attacks? 5) How many protection protocols are in place? 6) What is the figure of the dedicated funds for mobile protections? 7) Has your business and/or its consumers suffered from cyber-attacks? If so, how many in the past year To conduct the experiment, the following is needed: Strictly Mobile Devices Both private and public networks Third party, Native, Hybrid, and Web apps Testing Software: Mobile Security Framework (MobSF) For mobile users, survey questions will look like: 1) Do you make use of anti-virus protection apps? 2) Do you connect to public WIFI networks on your mobile device when you are in a public space? 3) Do you download third party applications on to your device? 4) Do you utilize strong password locks for your device and apps? 5) How do you know if apps are safe? 6) Have you ever experienced a cyber-attack? If so, how was the case handled? For representatives of corporations, survey questions will look like: 1) Does your business utilize mobile devices and their applications for daily operations? 2) If so, how many cybersecurity specialists are employed to maintain the security of your mobile devices and their networks? 3) How many security entities is your business partnered with? 4) What is your business's plan for handling cyber-attacks? 5) How many protection protocols are in place? 6) What is the figure of the dedicated funds for mobile protections? 7) Has your business and/or its consumers suffered from cyber-attacks? If so, how many in the past year To conduct the experiment, the following is needed: Strictly Mobile Devices Both private and public networks Third party, Native, Hybrid, and Web apps Testing Software: Mobile Security Framework (MobSF)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Time Series Databases New Ways To Store And Access Data

Authors: Ted Dunning, Ellen Friedman

1st Edition

1491914726, 978-1491914724

More Books

Students also viewed these Databases questions

Question

What does Processing of an OLAP Cube accomplish?

Answered: 1 week ago