Security Measures-Shereen
Two Security Measures Shereen Could Take to Secure Her Mobile Device
The security measures Sheren could take to secure her mobile device against any form of data risks include setting secure passwords and encrypting the data stored on her phone. Setting secure passwords begins with ensuring that any other person can hardly have access to various apps on the phone. The best way for Sheren to confirm that she has strong passwords is by setting different passwords for each application. If a hacker discovers a password for one application, they cannot access information stored on any other applications running on the mobile device (Gunduz & Das, 2020). The second data encryption measure involves Sheren ensuring that the data stored on the mobile device is unreadable to prevent it from being understood. Since many phones have encryption settings, data encryption is an easy step that entails just enabling the security menu.
Setting Up These Security Measures
Sheren can implement these security measures following these steps. Firstly, Sheren should follow the laid down principles while developing strong passwords for the various applications on her mobile device. For instance, Sheren should avoid using obvious words while creating the password, including but not limited to one’s name, the spouse’s name, or the name of children or even pets within the homestead (Gunduz & Das, 2020). Also, Sheren should adopt the utilization of special characters in her passwords, consider adding a foreign word, and avoid using passwords that have been in use before (Sikder et al., 2021).
Additionally, since Sheren’s mobile device is Android, she should ensure that the phone is 80% charged before encrypting her data. The encryption of an Android phone begins with unrooting it. She can then go to the settings drop-down menu and select “Security,” after which she should then proceed to select “Encrypt Phone” (Sikder et al., 2021). This process can take an hour or more, requiring the phone to be fully charged to prevent data loss due to the interruption of the encryption process.
References
Gunduz, M. Z., & Das, R. (2020). Cyber-security on the smart grid: Threats and potential solutions. Computer networks, 169, 107094.
Sikder, A. K., Petracca, G., Aksu, H., Jaeger, T., & Uluagac, A. S. (2021). A survey on sensor-based threats and attacks to smart devices and applications. IEEE Communications Surveys & Tutorials, 23(2), 1125-1159.
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Shereen works as an executive reporter for News Today. The assignment which she is currently working on will expose a major cover-up at the mayor’s office. All the information Shereen has gathered is stored on her phone. She is worried that someone may attempt to steal the phone in order to stop the story.
Respond to the following in a minimum of 175 words:
What are two (2) security measures Shereen can take to secure her mobile device?
Describe how to set up these security measures.