Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
8 views4 pages

Cyber Security Notes

Credit card frauds have surged in the mobile and wireless computing era due to technologies like wireless banking and smartphones, with common types including phishing, skimming, and physical card payment fraud. Contributing factors include increased mobile payment usage, physical loss of devices, and poor user awareness. Prevention measures involve two-factor authentication, user awareness, and advanced security technologies like biometrics.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views4 pages

Cyber Security Notes

Credit card frauds have surged in the mobile and wireless computing era due to technologies like wireless banking and smartphones, with common types including phishing, skimming, and physical card payment fraud. Contributing factors include increased mobile payment usage, physical loss of devices, and poor user awareness. Prevention measures involve two-factor authentication, user awareness, and advanced security technologies like biometrics.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

extract and then give without summarising

Q. Discuss credit card frauds in mobile and wireless computing era.


Ans:
Credit card frauds have become increasingly prevalent in the mobile and wireless computing
era. The introduction of technologies like wireless banking, smartphones, and wireless
transactions has increased the risk.
Types of Credit Card Frauds:
Phishing: Fraudulent emails or fake messages.
Physical Card Payment: At POS (Point of Sale) terminals.
Skimming: Banks do not take use of the latest security measures.
Definitions:
Phishing: Similar to phishing but uses SMS or MMS to obtain users' login credentials,
passwords, and financial information.
Card Skimming: Device is attached to the card terminal (e.g., ATMs, POS terminals) to steal
card information during swiping.
There are many more ways to commit credit card fraud.
Q. Factors contributing to mobile and wireless credit card frauds:
Ans:
Increase in use of mobile payments.
Physical loss of mobile.
Poor user awareness.
Lack of security measures.
Q. How to prevent it?
Ans:
Two Factor Authentication.
Bonus Number.
Using advanced security like biometrics.
User awareness.
EMV/CHIP card technology.

same for this


Q. What are the security implications for organizations?
Ans: Managing Diversity and Proliferation of Handheld Devices.
Cyber security is a top priority for most organizations.
Many organizations forget to keep track of all the various mobile devices being used.
It is difficult to identify mobile devices that are not listed in the company’s asset register.
When an employee leaves or loses their device, the organization cannot always track
access to sensitive data.
Unconventional / Stealth Storage Devices
USB devices or similar devices used by employees can be a cyber security risk.
These devices can be easily connected to a home network and the office network, posing a
big threat.
Their small size makes them easy to hide.
It is hard to ban these devices to prevent network and data loss.
Threats through Lost and Stolen Devices
Lost or stolen devices are a growing cyber security issue.
Losing a mobile device may result in data being misused.
Companies face a big security risk per lost device.
If hackers access a lost or stolen mobile device, confidential information may be
compromised.
Organizations must take steps to prevent network breakdowns and security risks [1] .

same for this


Explain the security measures and policies taken for mobile devices
With widespread use of mobile devices, many cybersecurity risks are emerging.
People, especially employees, process important and sensitive information on mobile
devices.
These devices contain and store passwords, emails, and work data.
Losing or losing a phone can expose a lot of information and harm business.
This can lead to PR disasters and legal problems.
It is important to practice caution about what information is stored on mobile devices.
Tracking people about their mobile device usage.
Regular audits of services used on every device should be conducted.

Q. Find some attacks on mobile devices


There are the following attacks on mobile devices:
Phishing via fake messages on social media, tricking users into giving away personal
information.
Malware attacks that infect mobile devices.
Exploiting Bluetooth, Wi-Fi, or other network connections to hack mobile devices.
Compromising location spoof attacks by sending fake GPS/Wi-Fi signals.
Ransomware: Software that locks your phone and demands payment to unlock it.
Data leakage: Sensitive information gets into the wrong hands via apps or network
attacks.
Social engineering: Tricking users into revealing sensitive information.

Q. Explain Wireless Devices with Security Challenges


Wireless devices like smartphones and laptops are very important for business and personal
use.
They provide increased mobility and allow office work from various locations.
In 2023, there were over 6.8 billion mobile connections globally.
Many of these devices can connect to the internet, increasing accessibility but also security
risks.
The main security challenge is managing and securing these devices.
These devices increase security and can boost productivity.
However, employees often bring their own devices (BYOD), increasing risks.
The increased variety of devices makes security management more complex.
In summary, the main security challenge for wireless devices is protecting information
globally [2] .

Q. What are the Security Challenges Faced by Wireless Devices?


Devices operate in constantly changing environments.
Data is often held or transferred wirelessly, increasing risk.
People easily lose or misplace wireless devices, making data theft more likely.
Sensitive and confidential information can be exposed if devices are lost or stolen.
There is a need for robust network management and security policies.
Organizations must plan for and respond to device loss or theft.
Wireless devices are vulnerable to malware, phishing, and network attacks.
Encryption, authentication, and regular updates are major solutions to minimize security
risks [2] .

1. Screenshot_2025-05-22-01-34-44-67_e2d5b3f32b79de1d45acd1fad96fbb0f.jpg
2. Screenshot_2025-05-22-01-37-19-71_e2d5b3f32b79de1d45acd1fad96fbb0f.jpg

You might also like