Question: Im doing a research project on mobile security and Im trying to bring upon more awareness of cyber attacks. Im also trying to signify the

Im doing a research project on mobile security and Im trying to bring upon more awareness of cyber attacks. Im also trying to signify the importance of strong mobile security practices to protect mobile devices. In my mythology portion of my research, Im formulating a survey that aims to study the knowledge of mobile user's awareness of cyber attacks and moble security protection solutions. Another survey will be conducted upon representatives that utilize mobile devices to operate. Im also conducting an experiment on the integrity of a variety of mobile devices. Ill post the questions and expetiment questions and guidlines.
Name and thoroughly explain multiple methods of how I can implement my surveys and experiment to get groundbreaking results. Im doing a research project on mobile security and Im trying to
bring upon more awareness of cyber attacks. Im also trying to signify

For mobile users, survey questions will look like: 1) Do you make use of anti-virus protection apps? 2) Do you connect to public WIFI networks on your mobile device when you are in a public space? 3) Do you download third party applications on to your device? 4) Do you utilize strong password locks for your device and apps? 5) How do you know if apps are safe? 6) Have you ever experienced a cyber-attack? If so, how was the case handled? For representatives of corporations, survey questions will look like: 1) Does your business utilize mobile devices and their applications for daily operations? 2) If so, how many cybersecurity specialists are employed to maintain the security of your mobile devices and their networks? 3) How many security entities is your business partnered with? 4) What is your business's plan for handling cyber-attacks? 5) How many protection protocols are in place? 6) What is the figure of the dedicated funds for mobile protections? 7) Has your business and/or its consumers suffered from cyber-attacks? If so, how many in the past year To conduct the experiment, the following is needed: Strictly Mobile Devices Both private and public networks Third party, Native, Hybrid, and Web apps Testing Software: Mobile Security Framework (MobSF) For mobile users, survey questions will look like: 1) Do you make use of anti-virus protection apps? 2) Do you connect to public WIFI networks on your mobile device when you are in a public space? 3) Do you download third party applications on to your device? 4) Do you utilize strong password locks for your device and apps? 5) How do you know if apps are safe? 6) Have you ever experienced a cyber-attack? If so, how was the case handled? For representatives of corporations, survey questions will look like: 1) Does your business utilize mobile devices and their applications for daily operations? 2) If so, how many cybersecurity specialists are employed to maintain the security of your mobile devices and their networks? 3) How many security entities is your business partnered with? 4) What is your business's plan for handling cyber-attacks? 5) How many protection protocols are in place? 6) What is the figure of the dedicated funds for mobile protections? 7) Has your business and/or its consumers suffered from cyber-attacks? If so, how many in the past year To conduct the experiment, the following is needed: Strictly Mobile Devices Both private and public networks Third party, Native, Hybrid, and Web apps Testing Software: Mobile Security Framework (MobSF)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!