Last week we discussed vulnerabilities and weaknesses with mobile applications. Analyze the methods to protect mobile devices including keeping data secure between devices and within applications.
Instructions: Your initial post is due by 11:55 p.m. ET on Wednesday. All posts must be a minimum of 250 words. You are required to respond to at least two of your classmates post by 11:55 on Sunday. All follow-up posts to your classmates must be a minimum of 150 words for each required post. Follow-up posts can add additional insight to a classmate’s opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. You may wish to visit a couple of the web sites contributed by your classmates and share your opinion of these sites with the class. Be sure to read the follow-up posts to your own posts and reply to any questions or requests for clarification. You are encouraged to conduct research and use other sources to support your answers. List your references at the end of your post.