Grading Guide: Lifespan Development and Personality Paper
PSY/103 Version 8
1
Grading Guide
Lifespan Development and Personality Paper
This assignment is due in Week Four.
Content
60 Percent
Points Earned
X/9
· Addresses the factors that affect physical development and
provides examples.
· Addresses the factors that affect cognitive development and
provides examples.
· Addresses the factors that affect social, moral, and personality
development.
· Explains at least two theoretical perspectives associated with
social, moral, and personality development.
Comments:
Organization and Development
20 Percent
Points Earned
X/3
· The paper is 1.050 to 1,400 words in length.
· The paper is clear and organized; major points are supported
by details, examples, or analysis.
· The tone aligns with the assignment’s purpose and is geared
toward the appropriate audience.
· The paper provides relevant and sufficient background on the
topic.
· The paper is logical, flows, and reviews the major points.
Comments:
Mechanics and Format
20 Percent
Points Earned
X/3
· The assignment file is presentable and functional.
· Rules of grammar, usage, and punctuation are followed;
spelling is correct.
· The paper—including the title page, reference page, tables,
and any appendices—is consistent with APA guidelines.
Comments:
Additional Comments:
Total Earned
X/15
Copyright © 2015 by University of Phoenix. All rights reserved.
Running Head: Mobile Computing Security
Mobile Computing Security
Mobile Computing Security
Table of Contents
1.
Abstract………………………………………………………………
………………3
2.
Introduction…………………………………………………………
……………….4
3. Current Trends in Mobile Computing
Security………………………………………5
4. Steps for Data Confidentiality and
Integrity…………………………………………6
5.
Conclusion……………………………………………………………
………………7
6.
References……………………………………………………………
………………8
Abstract
This paper will deal with one of the important concepts of the
technological industry. Mobile Computing Security is the
critical problem facing by most of the industries and following
improper measures to control this problem will lead to loss of
critical data and will also bring huge loss to the organization.
This paper will discuss the current trends that organizations are
facing with mobile security. This paper will also explain about
the steps to be taken by all the organizations to control data
integrity and confidentiality.
Introduction
Security is the core part of the organization and most of the
organizations use to work in the office as they have lot of
security and firewalls provided in the office which brings lot of
data integrity in the organization. But now a day’s all the data
and voice transfers are happening on the mobile devices,
laptops and tablets which are connected to the wireless
networks. Using these kinds of devices are advantageous for all
kinds of people to work from anyplace at anytime (Krishna,
2015). By implementing these kinds of devices at office and
also for doing personal works is causing lot of security
problems in the organizations and also leading to the loss of
data. Loss of sensitive data will bring many problems to the
organizations and all the stakeholders. This will lead move the
organization to huge financial troubles. To control these kinds
of problems everyone has to follow some set of strict rules and
procedures (Chris, 2011).
Current trends with Mobile Computing Security
Mobile computing is used by all the organizations because of
seamless access to information from anyplace in anytime. There
are many current trends in the mobile computing which brings
lot of security problems to the organizations. Some of them are:
1. BYOD (Bring your own device): It is the one of the hot topic
in the organizations where organizations are allowing all the
employees to bring their own devices like laptops, tablets and
mobile devices for professional work. This will decrease the
budget for the organization but it increases many problems. As
the organizations cannot control the devices that are beyond
their network and this will be very advantageous to many
hackers to access the information (Paul, 2009).
2. Anytime, anywhere and any device: This is one the best
feature in mobile computing where all the employees can access
the information from any place and can also work at anytime.
All the employees are treating the professional information as
their personal work without proper security measures like
firewalls and antivirus (Paul, 2009).
3. Mobile Applications: There are many web and mobile
applications released into the market by various vendors and
most of the applications are from un trusted sources which bring
various Trojans and virus into the systems and the whole data
will be under serious security threat (Andreas, 2012).
4. Wireless internet connection: The whole mobile computing
technology works based on the wireless internet connection
which is one of the major drawback where it gives way to many
intruders into the network to access the information.
5. Weak Operating Systems: Most of the personal computers
will not have current operating systems which is one more weak
point for security attack.
Steps for Data Confidentiality and Integrity
Mobile computing is the current trend in the market and there
are many attacks on the systems due to weak security. To
overcome this all the organizations should take serious
measures to maintain data confidentiality.
1. Ensure to update software: The software’s in the mobile
computing devices should be updated to the latest version to
stay away from the latest security threats (Chris, 2011).
2. Strong Passwords: The passwords for all the devices should
be very strong and critical as there will be more chances to lose
the device or any unauthorized access to the systems. The
passwords should be changed regularly and there should be
timeout for the system (Michael, 2011).
3. Ensure to have strong firewalls: The organizations and all the
employees should ensure to have strong firewalls for the
systems and the network and also there should be good malware
detection software’s installed on the systems. The organizations
should ensure that all the systems are following the proper
security measures (Chris, 2011).
4. Shop for Secure Applications: Buying secure applications
from a trusted vendors will be very safe for all the devices. This
will also keep the devices away from security issues (Michael,
2011).
5. Device tracking software: All the organizations should ensure
that there is a device tracking software installed on all the
systems as there will lot of sensitive data on the systems and
lose of this will bring many problems.
6. Encryption of data: Apart from the encryption to the systems
there should be very tough encryption to the data in the system
which will save many sensitive documents from many intruders
(Michael, 2014).
7. Network protection: The network should be protected on a
secured layer and there should be a proper firewall for the
network. Even the network should also have strong passwords to
access.
Conclusion
All the organizations have found the best way to complete their
work by choosing mobile computing as their platform. There are
many advantages by mobile computing but at the same way
there are many security related issues associated. Organization
can overcome all these attacks and can maintain security by
giving proper training to all the employees, stakeholders,
following right policies. Following all these steps will ensure
proper security and will reduce lot of risks. All the technology
professionals should work very hard to design new technologies
that will save the organizations from security problems.
References
Andreas, B. (2012). Top 5 Enterprise Security Trends. Retrieved
from
https://esj.com/Articles/2012/08/06/5-Enterprise-Security-
Trends.aspx?Page=1
Chris,D. , & Mike, S. (2011). IT Auditing: Using Controls to
Protect Information Assets.
Newyork: McGraw hill Education.
Krishna, P. , Bala, C. (2015). Security issues and challenges in
mobile computing and M-commerce. International Journal of
Computer Science & Engineering Survey, 6(2), 29-45.
Michael, C. (2014). 10 commons mobile security problems to
attack. Retrieved from
http://www.pcworld.com/article/2010278/10-common-mobile-
security-problems-to-attack.html
Michael, A. (2011). Smart security steps for mobile computing.
Retrieved from
http://realtormag.realtor.org/technology/tech-
watch/article/2011/03/smart-security-steps-for-mobile-
computing
Paul, D. (2009). Trends in Mobile Computing. Retrieved from
http://searchmobilecomputing.techtarget.com/feature/Trends-in-
mobile-computing
Grading Guide Lifespan Development and Personality PaperPSY1.docx

Grading Guide Lifespan Development and Personality PaperPSY1.docx

  • 1.
    Grading Guide: LifespanDevelopment and Personality Paper PSY/103 Version 8 1 Grading Guide Lifespan Development and Personality Paper This assignment is due in Week Four. Content 60 Percent Points Earned X/9 · Addresses the factors that affect physical development and provides examples. · Addresses the factors that affect cognitive development and provides examples. · Addresses the factors that affect social, moral, and personality development. · Explains at least two theoretical perspectives associated with social, moral, and personality development. Comments: Organization and Development 20 Percent Points Earned X/3 · The paper is 1.050 to 1,400 words in length. · The paper is clear and organized; major points are supported
  • 2.
    by details, examples,or analysis. · The tone aligns with the assignment’s purpose and is geared toward the appropriate audience. · The paper provides relevant and sufficient background on the topic. · The paper is logical, flows, and reviews the major points. Comments: Mechanics and Format 20 Percent Points Earned X/3 · The assignment file is presentable and functional. · Rules of grammar, usage, and punctuation are followed; spelling is correct. · The paper—including the title page, reference page, tables, and any appendices—is consistent with APA guidelines. Comments: Additional Comments: Total Earned X/15 Copyright © 2015 by University of Phoenix. All rights reserved. Running Head: Mobile Computing Security Mobile Computing Security
  • 3.
    Mobile Computing Security Tableof Contents 1. Abstract……………………………………………………………… ………………3 2. Introduction………………………………………………………… ……………….4 3. Current Trends in Mobile Computing Security………………………………………5 4. Steps for Data Confidentiality and Integrity…………………………………………6
  • 4.
    5. Conclusion…………………………………………………………… ………………7 6. References…………………………………………………………… ………………8 Abstract This paper willdeal with one of the important concepts of the technological industry. Mobile Computing Security is the critical problem facing by most of the industries and following improper measures to control this problem will lead to loss of critical data and will also bring huge loss to the organization. This paper will discuss the current trends that organizations are facing with mobile security. This paper will also explain about the steps to be taken by all the organizations to control data integrity and confidentiality.
  • 5.
    Introduction Security is thecore part of the organization and most of the organizations use to work in the office as they have lot of security and firewalls provided in the office which brings lot of data integrity in the organization. But now a day’s all the data and voice transfers are happening on the mobile devices, laptops and tablets which are connected to the wireless networks. Using these kinds of devices are advantageous for all kinds of people to work from anyplace at anytime (Krishna, 2015). By implementing these kinds of devices at office and also for doing personal works is causing lot of security problems in the organizations and also leading to the loss of data. Loss of sensitive data will bring many problems to the organizations and all the stakeholders. This will lead move the organization to huge financial troubles. To control these kinds of problems everyone has to follow some set of strict rules and procedures (Chris, 2011). Current trends with Mobile Computing Security Mobile computing is used by all the organizations because of
  • 6.
    seamless access toinformation from anyplace in anytime. There are many current trends in the mobile computing which brings lot of security problems to the organizations. Some of them are: 1. BYOD (Bring your own device): It is the one of the hot topic in the organizations where organizations are allowing all the employees to bring their own devices like laptops, tablets and mobile devices for professional work. This will decrease the budget for the organization but it increases many problems. As the organizations cannot control the devices that are beyond their network and this will be very advantageous to many hackers to access the information (Paul, 2009). 2. Anytime, anywhere and any device: This is one the best feature in mobile computing where all the employees can access the information from any place and can also work at anytime. All the employees are treating the professional information as their personal work without proper security measures like firewalls and antivirus (Paul, 2009). 3. Mobile Applications: There are many web and mobile applications released into the market by various vendors and most of the applications are from un trusted sources which bring various Trojans and virus into the systems and the whole data will be under serious security threat (Andreas, 2012). 4. Wireless internet connection: The whole mobile computing technology works based on the wireless internet connection which is one of the major drawback where it gives way to many intruders into the network to access the information. 5. Weak Operating Systems: Most of the personal computers will not have current operating systems which is one more weak point for security attack. Steps for Data Confidentiality and Integrity Mobile computing is the current trend in the market and there are many attacks on the systems due to weak security. To overcome this all the organizations should take serious measures to maintain data confidentiality. 1. Ensure to update software: The software’s in the mobile computing devices should be updated to the latest version to
  • 7.
    stay away fromthe latest security threats (Chris, 2011). 2. Strong Passwords: The passwords for all the devices should be very strong and critical as there will be more chances to lose the device or any unauthorized access to the systems. The passwords should be changed regularly and there should be timeout for the system (Michael, 2011). 3. Ensure to have strong firewalls: The organizations and all the employees should ensure to have strong firewalls for the systems and the network and also there should be good malware detection software’s installed on the systems. The organizations should ensure that all the systems are following the proper security measures (Chris, 2011). 4. Shop for Secure Applications: Buying secure applications from a trusted vendors will be very safe for all the devices. This will also keep the devices away from security issues (Michael, 2011). 5. Device tracking software: All the organizations should ensure that there is a device tracking software installed on all the systems as there will lot of sensitive data on the systems and lose of this will bring many problems. 6. Encryption of data: Apart from the encryption to the systems there should be very tough encryption to the data in the system which will save many sensitive documents from many intruders (Michael, 2014). 7. Network protection: The network should be protected on a secured layer and there should be a proper firewall for the network. Even the network should also have strong passwords to access. Conclusion All the organizations have found the best way to complete their work by choosing mobile computing as their platform. There are many advantages by mobile computing but at the same way there are many security related issues associated. Organization can overcome all these attacks and can maintain security by giving proper training to all the employees, stakeholders,
  • 8.
    following right policies.Following all these steps will ensure proper security and will reduce lot of risks. All the technology professionals should work very hard to design new technologies that will save the organizations from security problems. References Andreas, B. (2012). Top 5 Enterprise Security Trends. Retrieved from https://esj.com/Articles/2012/08/06/5-Enterprise-Security- Trends.aspx?Page=1 Chris,D. , & Mike, S. (2011). IT Auditing: Using Controls to Protect Information Assets. Newyork: McGraw hill Education. Krishna, P. , Bala, C. (2015). Security issues and challenges in mobile computing and M-commerce. International Journal of Computer Science & Engineering Survey, 6(2), 29-45. Michael, C. (2014). 10 commons mobile security problems to attack. Retrieved from http://www.pcworld.com/article/2010278/10-common-mobile- security-problems-to-attack.html Michael, A. (2011). Smart security steps for mobile computing. Retrieved from http://realtormag.realtor.org/technology/tech- watch/article/2011/03/smart-security-steps-for-mobile- computing Paul, D. (2009). Trends in Mobile Computing. Retrieved from http://searchmobilecomputing.techtarget.com/feature/Trends-in- mobile-computing