Sunteți pe pagina 1din 3

1

Annum Abbasi
CSIT 101
September 30, 2015
Assignment 1: Information literacy
MOBILE APPLICATION SECURITY

1-2.
A mobile phone with a secure card reader creates an agile and affordable POS. But
businesses using mobile POS devices have the same responsibility for maintaining
compliance with cardholder data as they do with fixed POS. A secure card reader is
critical but it isnt enough. To protect your purchasers and your business -- you need
security to help:

prevent fraudulent use


alert you to tampering with applications or the device itself
deliver proactive protection and defense against malware and other threats

3.

I used two search engines, Yahoo.com and Google.com, to search two additional

articles on mobile application security. I found out that both of them almost had same topics.
However, Google.com gave 73.2 million results and Yahoo.com gave almost 96.6 million
results. Also, I found that the Yahoo.com had more advertisements than Google.com.
Therefore, I think that Google.com is better than Yahoo.com.
4. It was a PDF report. I could not find exact time or date when it was written. All I could find
out is that it was reported in September 2015

Yes, it is related to my topic about mobile application security and answers the

question that how mobile applications can be secured.

This report is given by cenzic.com. Yes, they are qualified to write about this
topic because Cenzic is the company that provides the security of web and mobile

applications. Also Cenzic is the part of trust wave. I read it on its website, also I read
about the awards it got for apps security.

After I read about 17 awards Cenzic has received for software security until 2015,
so I think its information is trustworthy.

I think it was written to give information, and the material is objective.


5:
Security of mobile applications
I used ZDNET.com and TECHCRUNCH.com I have used these databases before
and I like these two because I think they give good results and journals about the topics.
However, I like the ZDNET.com more because it gives precise results. Also, on
ZDNET.com, I found articles easy to cite.
6:
I found two journal articles about mobile application security. Internet article was easy to
access than two journal articles. Because on the internet, I found my article in seconds and it was
recently reported. Nevertheless, on CCBC database, it was hard to find recently updated articles.
It took me an hour to find recently updated and relevant articles. One of the journal articles was
published in September 22, 2015 and other was published in 2015.

7:

I used MLA format.


Flinders, Karl. "Mobile Security -- What Works And What Doesn't." Computer Weekly (2015):

25. MasterFILE Premier. Web. 30 Sept. 2015.


Hess, Ken. "IT Budgets Expected to Grow Slowly in 2016: Security and Cloud Will Suffer |
ZDNet." ZDNet. N.p., 30 Sept. 2015. Web. 30 Sept. 2015.
"Trustwave Mobile Security Product Brief." Trustwave. N.p., 2015. Web. 30 Sept. 2015.

Dickson, Ben. "Dont Panic Over The Rise In Personal Data Theft." TechCrunch. N.p., 27 Sept.
2015. Web. 30 Sept. 2015.

S-ar putea să vă placă și