Free Essay

Mobile Device Security and Other Threats

In:

Submitted By boscomuma
Words 1288
Pages 6
Clostridium Tetani The bacterium kingdom possesses many different types of organism which are sometimes vital to our survival on this planet, but there are also thousands of other members of the bacteria kingdom which are very harmful when they are contracted by the human body. One of those organisms is Clostridium Tetani also known as Tetanus. This bacterium is a “Gram-positive, meaning it lacks an outer lipopolysaccharide membrane and possesses only a thick peptidoglycan cellular wall”. Tetanus is an acute, usually a fetal illness caused by Clostridium Tetani infection at a break in the skin, for example in a wound. It can also occur in burns as a complication and surgical site infection (2). During its premature stages the bacteria has a very low heat tolerance and can barely survive where oxygen is located. When formed on the human skin it takes the shape of a hard spore like infection which can withstand antiseptics and heat rising up to 249.8 degree F (121deg C.) for almost ten minutes.
History
The history of this disease dates back to the 1800’s, when the physician Arthur Nicolaier, discovered the disease, within the same year both Antonio Carle and Giorgio Rattone demonstrated how it was transmitted by using a rabbit. The rabbit was placed in a simulated area while it was injected with tetanus which later ended up killing the animal. Towards the end of the 1800’s both Kitasato Shibasaburo and French microbiologist and veterinarian Edmond Nocord prove that tetanus could be prevented or treated using antitoxin. Through the discovery made by these men the reported tetanus cases in the US has decline at a drastic rate, from “several thousand cases in the late 1940’s to 27 cases and two deaths in 2005”. Several factors have contributed to the decline in tetanus morbidity and mortality, including the widespread use of tetanus toxoid during world war II–containing vaccines since the late 1940s Although cases in the US has decline, in developing countries around the world Tetanus cases are still at a high level (5). Most of these cases occur during child birth when the umbilical stump of a new mother becomes contaminated. Other times during delivery mother who did not possess sufficient circulatory antitoxin to secure the infant’s safe passage by transplacental transfer. To reduce the effect of the infant being in danger, it will require the execution of a three-branched strategy: vaccination of women of childbearing age, clean delivery, and application of topical antimicrobials (destroy the growth of microbes) to the umbilical stump (4).
Disease
When a person is first infected with tetanus the symptoms usually takes from two to six days to appear after the wound has been infected. Some common symptoms are chills, difficulty swallowing, headache, jaw and neck stiffness, sore throat, low fever, restlessness, irritability, and stiff arms and legs. At the early stages it may seem like a regular fever but as time goes by the fever increases, and symptoms such as difficulty opening the jaw, and muscle spasms in the neck, back and abdomen may occur. The patient’s pulse is fast even though the fever is not high. Although patients with tetanus are often mentally alert, they can go into a coma unpredictably. Some mid-level symptoms are blue lips which are a sign of depressed breathing meaning there is too much carbon dioxide or very little oxygen in the blood (6).
Pathogenesis
Clostridium Tetani often enters the body through a wound and in the presence of low oxygen conditions, then the spores start to geminate and toxins are being produced. The Tetanospasmin toxin is created when the spores geminate and the organisms’ cells grow after entering the wound. The toxin then travels in the bloodstream, and then reaches the nervous system causing painful and muscular contractions. When the toxins are synthesized, it takes between 2 to 14 days to reach the spinal cord (6). The usual medical manifestations of tetanus are caused when tetanus toxin interferes with the release of neurotransmitters, blocking inhibitor impulses and this leads to unopposed muscle contraction and spasm.
Transmission
Tetanus is transmitted in many ways but it’s not transmitted from person to person. Clostridium Tetani is found in soil, human feces or intestines and animal waste. Other ways of transmissions are animal bites, dirty or rusty nails and sharp objects contaminated is another way. The most common way to get infected is through a wound because it provides an anaerobic environment for the organism to grow.
Treatment
When the infection is known, and all signs point to it being Tetanus, then steps should be taken to treat the infections before it leads to something else. It all starts with cleaning the wound/infected area. Dead tissue and other dead remains should be removed. If Tetanic spasms are occurring, supportive therapy and maintenance of an enough airway is critical. Tetanus immune globulin (TIG) is recommended for persons with tetanus. TIG can only help remove unbound tetanus toxin. It cannot affect toxin bound to nerve endings. Intravenous immune globulin (IVIG) contains tetanus antitoxin and may be used if TIG is not available. Penicillin is good also because it gets rid of the organism. Advancement in the medical field has enabled us to be able to treat and cure the disease, but sometimes it is best not to let things get that far. The best way to make sure you are not one of those who get infected by tetanus is to take the proper steps to prevent it. DPT is a mixed vaccine, which simply means that it provides immunity to different diseases. The vaccine protects you for five years, and the treatment you get depends on your vaccination status. After five years the effectiveness starts to slowly die off. Having the disease once doesn't give you lasting immunity against tetanus. People who have been vaccinated in the last ten years that have minor wounds don't need treatment. Those who were vaccinated more than ten years ago get a booster shot of the vaccine, which consists of a weakened form of the tetanus toxin. For deep or dirty wounds, people who received their last tetanus booster more than 5 years ago will need another booster shot. Those who have never been vaccinated need tetanus immune globulin (a blood product from an immune person). They also need to be vaccinated against tetanus. Five doses of diphtheria, tetanus toxiods and acellular pertussis vaccine are recommended for infants and children. You can also reduce your risk by disinfecting all wounds thoroughly. You might consider wearing knee and elbow pads during sports that are likely to involve violent contact with the ground. Avoid going barefoot while outside of your house. This will help to prevent infection from accidentally stepping on sharp, dirty objects (7).

Sources 1. P. Poudel, Budhathki S. and Manandhar S. 2009. “Tetanus”. Kathmandu Univ Med J 7(27): 315-322. 2. Brook Itzhak. 2008 “Current Concepts in the Management of Clostridium Tetani Infection”. Expert Review of Anti-infective Therapy 6(3):327-336 3. Doxey C. Andrew, Michael DJ Lynch, Kristen M. Muller, Elizabeth M Meiering, and Brendan J McConkey. 2008. “Insights Into Evolutionary Origins of Clostridial Neurotoxins From Analysis of The Clostridium Botulinum Strain A Neurotoxin Gene Cluster”. BMC Evolutionary Biology 8:316. 4. Demicheli V, Barale A, Rivetti A. 2005. “Vaccines for Women to Prevent Neonatal Tetanus”. 19(4). Cochrane Database Systematic Reviews. 5. Krestsinger Katrina, Pamela Srivastava. 2008. “Chapter 16: Tatanus”. Centers for Disease Control and Prevention. Manual for the Surveillance of VPD. 6. Paul Arnold. 2009. What is Clostridium Tetani? 7. Broder R Karen, “et al”. 2006. “Preventing Tetanus, Diphtheria, and Pertussis Among Adolescents”. Centers for Disease Control and Prevention. ACIP 55 (3):1-34.

Similar Documents

Premium Essay

Case Study: Mobile Device Security and Other Threats

...Case Study: Mobile Device Security and Other Threats Strayer University Authors Note This paper was prepared for CIS 502 – Theories of Security Management Abstract Mobile communication and computing devices are integral part of today’s business. This provides the executives the opportunity to work from virtually anywhere anytime and became one of the most valuable tools to make business communications. However, due to the nature and size of the device and communication methods, the devices are prone to be lost or compromised and can fall into the hands of unauthorized persons, which makes these devices a very big security concern for the businesses. In this paper the nature of IT related threats faced in 2014 are discussed along with the security issues of mobile devices. a) Security threats presented within the “Security Threat Report 2014” report: The security report of Sophos (Security Threat Report 2014 Smarter, Shadier, Stealthier Malware. (n.d.). Retrieved August 19, 2014, from https://blackboard.strayer.edu/bbcswebdav/institution/CIS/502/1144/Week8/sophos-security-threat-report-2014.pdf) highlights the emerging security risks in the world. It the report, they have identified the following concerns for 2014: a. More efficient Botnets: The botnets become more resilient and stealth by the year 2014. Along with many known attributes, the sharing and copying botnet codes have resulted in emerging new botnets which are being used for various attacks...

Words: 1993 - Pages: 8

Premium Essay

Mobile Security

...WHITE PAPER Copyright © 2011, Juniper Networks, Inc. 1 MOBILE DEVICE SECURITY— EMERGING THREATS, ESSENTIAL STRATEGIES Key Capabilities for Safeguarding Mobile Devices and Corporate Assets 2 Copyright © 2011, Juniper Networks, Inc. WHITE PAPER - Mobile Device Security—Emerging Threats, Essential Strategies Table of Contents Executive Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 3536 - Pages: 15

Free Essay

Cis502 Week 8 Assignment

...Mobile Device Security and Other Threats Melissa M Dr. Constance Blanson Theories of Security Management November 30, 2014 Analyze the emerging security threats presented within the “Security Threat Report 2014” Security threats have not only grown and matured quickly, but the people behind these threats have become more creative in camouflaging their work. These criminals have become more adept at eluding their identification and are now relying on cryptography. Malware authors, as with users, are now focusing on mobile devices and web services. Numerous threats were listed in the Security Threat Report 2014 such as botnets, android malware, attacks on Linux platforms and Mac OS X, web-based malware, targeted threats to your financial accounts, unpatched windows systems and re-invented spam. These items are detrimental to companies and users. The more complex these threats get, the harder it is to protect against them. I will analyze botnets and android malware in this section. A botnet is a network of private computers infected with malicious software and controlled as a group without the owner’s knowledge. Criminals distribute malicious software that can turn your computer into a “bot”. When this occurs, your computer can perform automated tasked over the Internet without your knowledge. This type of malware is typically used to infect large numbers of computers. They are used to send out spam email messages, spread viruses, attack computers and servers...

Words: 1366 - Pages: 6

Premium Essay

Mobile Phone Reliability and Security

...Mobile Phone Reliability and Security EMP5169 Mobile Phone Reliability and Security EMP5169 Haotian Zhang 7436928 Haotian Zhang 7436928 Table of Contents Abstract 2 1. Introduction 2 2. Mobile Phone Security Issues. 3 3. Mobile Threats and Vulnerabilities 6 3.1. Mobile threats 6 3.2. Web-based Threats 8 3.3. Network-Based Threats 9 3.4. Physical Threats 10 3.5. Mobile Vulnerabilities 11 4. Protection Method And Corresponding Vulnerabilities 13 5. Conclusion 17 6. Reference 18 Abstract Mobile phones especially smart phones have played an important role in nowadays business work. They are one of the most popular platform for people to transfer and exchange data for communication. With the development of technologies, now mobile phones also get involved in area like banking, remote control, m-commerce, internet access, entertainment and medical usage. However, there are more and more security issues along with the smart phone development. It is necessary to find a reliable and convenient way to prevent mobile phones from unauthorized access and diverse attacks. It is suggested that biometrics security technology is best way nowadays and the reliability of wireless services should be improved. This article will introduce many kind of threats and vulnerabilities which affect the mobile phones followed by a biometrics solution to secure the mobile phones. Introduction Mobile phones are booming since 21th century, with global...

Words: 3521 - Pages: 15

Premium Essay

Mobile Technology

...would go mobile. With the emergence of new technology and people desiring to have technology at their fingertips, mobile computing has changed the way we interact with the world around us. While mobile technology provides the convenience of high availability and connectivity, these conveniences have also increased mobile device vulnerability to malicious attacks and threats. Many companies are providing mobile devices to employees in order to conduct business away from the office. This has proven to be major headache for IT professionals. Normally, IT professionals control network activity through vulnerability assessments, scans, audits, and security patches; unfortunately, the same does not hold true for mobile devices. Unlike wired network connections, mobile devices favor wireless internet connectivity and are constantly broadcasting for connection to a wireless network. Many hotels, restaurants, and airports offer free WI-FI to the public, unlike home or office networks, most public networks are not secure. It is tempting to utilize free connectivity to check email, however, these networks do not offer the level of encryption needed to conduct company business and employees should be advised to avoid unencrypted public wireless internet connectivity. Disabling Bluetooth wireless capability is another way to assist in protecting mobile devices from malicious attacks. Switching the Bluetooth access to the off position will prevent the mobile device from searching...

Words: 733 - Pages: 3

Premium Essay

Mr Sam

...Mobile Security Mobile security is where the protection of cell phones, smartphones, laptops and other portable electronic and wireless devices from threats and to be taken slightly. The importance of the mobile security is that these devices are used vulnerabilities. These devices are called mobile because we move with them from place to place and in the process they are subject to threats. Since the number of mobile devices has greatly increased in the last decade, it is therefore most likely that the threat associated with them will be high as well. It is common at any given second to have someone using a mobile device because some people say that they help them pass time. However, the security of these devices is vital and need not as storage devices for our personal and private messages which we do not want to share. When they are exposed to threats, there is a likelihood that the data may be changed or modified and this may lead to the real owner of the data being misled if he or she uses the data which is not accurate. Smartphones may contain credit card numbers, social security numbers and when they fall in the hands of criminals, the owner may end up having his money stolen. (Ruff & Nicolas (2011). Professionals like managers and professors use smartphones as their calendar and they store their appointment dates and details and if the data contained in them is tampered with, they may end up not staying on their schedule and if this...

Words: 1904 - Pages: 8

Premium Essay

Cloud

...STRAYER UNIVERSITY Mobile Devices Security Week 7 Case Study Professor Gideon Nwatu CIS 502 – Theories of Security Management May 26, 2013 Mobile Devices Security 1. Describe the emerging cyber-security issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. Emerging cyber-security issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report focused on mobile devices. The surge of mobile devices in all facets of human endeavors and its lack of adequate security highlighted the report. According to the report, emerging cyber-security issues that make mobile devices vulnerable are; * In order to improve usability for mobile devices, their applications depend on the browser, which presents exceptional challenges to security. Perfectly legitimate-looking images can hide a malicious link that, when touched, could give an attacker the capacity to spy or steal data. * Attacks target the use of SMS, e-mail and the mobile Web browser by mobile devices to launch an attack and steal data. * Increasingly, mobile devices are being used as storage devices just as USB flash drives and have therefore become the ideal medium to spread malware to protected systems. 2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. Due to the fact that mobile devices are increasingly being used in the...

Words: 1994 - Pages: 8

Premium Essay

Mobile Security Threats

... Computer Science University of Venda 2014 ABSTRACT We live in a digital era where communication, information sharing and even business transactions is exchanged on mobile devices such as laptop computers, palmtops, tablet computers, smartphones and cell phones. The new age group of young people have never known a life without a mobile device with internet capabilities. Mobile Devices are an integral part of personal and social lives it is only logical that users should have awareness of security during the use of mobile devices. Individuals and organisations have both been beneficiaries on the rapid expansion of information and communication technologies (ICTs). Inevitably however, these offerings by mobile devices also bring about security vulnerabilities which users in Thohoyandou are not aware of. According to Lookout principal security analyst Marc Rogers, 2013, following simple precautions like sticking to the Google Play Store can ensure the security of a mobile device. This is rather not always the case as hackers and crackers make use of trustful applications to distribute malware. This study intends to outline security vulnerabilities and deliver clear recommendations on essential security technologies and practices to help mobile device users in Thohoyandou. Correct misconceptions or myths in order to bring about changes in attitudes and usage behaviour. INTRODUCTION The internet has transformed South Africa in just...

Words: 2908 - Pages: 12

Premium Essay

Mobile Application Security

...SECURING A MOBILE WORLD Introduction Today’s smartphones and tablets are more than communication devices. They are hip-mounted personal computers, with more memory and processing power than your laptop of just a few years ago. They are an integrated part of our lives… personal and professional. The information they provide is so vital that the Army is piloting their use as standard field issue to every soldier, complete with combat-focused applications [1]. However, smartphones and tablets raise new security issues. They are more likely to be lost or stolen, exposing sensitive data. Malware risks are increased because they connect to the Internet directly rather than from behind corporate firewalls and intrusion-protection systems. Security of mobile devices focuses on controlling access through the use of device locks and hardware data encryption. While this may be sufficient for individual users, it is insufficient for defense needs. Many documented examples exist of hacking of the device lock, as well as defeats of the hardware-level encryption. Once the device is unlocked, there is generally unfettered access to all apps and their associated data. Military applications require additional application-level access controls to provide data security. Unfortunately, there are gaps in the application-level security model of the two predominant mobile operating systems: iOS from Apple and Google Android. Our ongoing research1 looks to address these gaps by developing innovative...

Words: 4009 - Pages: 17

Premium Essay

Mobile Device

...Mobile Devices Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs (Patricia & Donna, 2008). In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.  Risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. This open connectivity brings with it risks, however, some of which are similar to those in wired...

Words: 671 - Pages: 3

Premium Essay

Smartphones

...Security Issues in Smartphone Markets Are you buzzing about the new Verizon Blackberry Storm or the T Mobile G1? They are the new crave and everyone wants one right? What these owners many not know are the security risks that surround the raving technology. Most of the unawareness starts at companies and customers not placing more significance on security as smartphones get smarter. Although a smartphone may not be at greater risk than a PC, some security issues and risks are still present with PDA’s and smartphones. In the United Kingdom, a whooping 800,000 people were the victim of mobile phone theft in 2006. Even though 90 percent of these phones deactivated within 48 hours, what happened to the other 10% of users that lost data to the crime. Smartphones are linked to the corporate network and are as vital as a laptop on the company network. Also, you cannot stop your employees from having accidents by underestimating these devices. Mobile phone operators can stop SIM cards and stop expensive calls from being made. However, a smartphone differs from regular mobile phones. Executives carry all kinds of information on the device, from confidential announcements, to financial results and business in progress. If any of these were ever lost, it could result in the lost of business and trust within company IT infrastructures. It is important to recognize the dangers before permitting a full mobile device network within the company. When sending emails, texts, and...

Words: 2337 - Pages: 10

Premium Essay

Security Threats

...Security Threats & Vulnerabilities As information technology grows also does the need to protect technology or information on the system. Before we can protect the information on a system we need to know what to protect and how to protect them. First must decide what a threat to our system is. A Security threat is anything or anyone that comprise data integrity, confidentiality, and availability of a system. Another security issue for systems is Vulnerabilities in software that can be exploited by people that want to do harm to a system. It’s up to the personnel or team that’s in charge of protecting the system from threats and vulnerabilities. The personnel that secure information technology systems are known as (ISO) Information Security Officer, (IASO) Information Assurance Security Officer, (ISM) Information Security Manager ect. No matter what name the personnel there job is the same to protect information systems. Security Officers will have to set policies that govern the system and create plan on how to handle security threat and vulnerabilities. Security threats can consist of any number issues ranging from physical attack, spoofing, password attacks, identity theft, virus attacks, and Denial of Service attacks, Social Threats, Espionage, malware, spyware, Careless Employees, and hackers. We will disuse all of these threats and ways to prevent them later in the report. In 2010 Kevin Prince, CTO, Perimeter E-Security "As these security threats are becoming more...

Words: 2408 - Pages: 10

Premium Essay

Mobile Device Attacks

...Mobile Device Attacks and Their Effect on Your Personal Privacy CIS 4680- Security Issues Paper (Group 6) Over the last decade, smartphones have become more and more popular as the new handheld PC. With its processing power catching up with the PC, it brings much convenience to people’s daily life from fast access to latest information to efficient financial activities. However, with this increase in use of these functions, more security threats have aroused surrounding smartphones. As the mobile operation systems in different devices become more, it is opens more possibility for fast virus propagation and large scale damage. There have been several attacks targeting smartphones and it is a trend that hackers are moving the battlefield from PCs to smartphones because of promising profit and smartphones’ limitations for antivirus work. Hackers are migrating to the new smartphone platform for many reasons. Not only is the profit from smartphone hacking increasing, but as more consumers link their personal accounts (email, social networking, financial, etc.) to their smartphones, the private information of the users opens a window of opportunity. Hackers can infect smartphones to record phone calls, send and delete data messages, and spy on your phone’s activity. It does not only pose great security threats, but also causes an economic loss to common users. This definitely becomes a major issue when businesses are also taking advantage of the portable PC power of smartphones...

Words: 3045 - Pages: 13

Premium Essay

Anthem Health Data Breach

...database last week, potentially compromising the personal information of approximately 80 million former and current customers, as well as employees, according to multiple reports. The information potentially compromised includes names, dates of birth, medical IDs or Social Security numbers, street addresses, and email addresses, according to a statement from Anthem president and CEO Joseph Swedish posted on the company website. Employment information, some of which included income data, might also be at risk in the Anthem health data breach.2014-11-13-163188459 “Based on what we know now, there is no evidence that credit card or medical information, such as claims, test results or diagnostic codes were targeted or compromised,” Swedish said. “Once the attack was discovered, Anthem immediately made every effort to close the security vulnerability, contacted the FBI and began fully cooperating with their investigation.” Swedish added that the personal information of Anthem employees, including himself, were also compromised in this data breach. It was a “very sophisticated external cyber attack,” according to Swedish, and despite Anthem’s best efforts and “state-of-the-art information security systems” its IT system was breached. “We join you in your concern and frustration, and I assure you that we are working around the clock to do everything we can to further secure your data,” he said. Anthem will notify the current and former customers who may have had their...

Words: 1389 - Pages: 6

Premium Essay

The Pros And Cons Of Mobile Phones

...Mobile phones attached to us and some of us might even feel very unbearable without having one no matter wherever we are in today's modern world, back in around late 1980's the very first mobile phone was available in the market for purchase off course not everyone was afforded to buy it at that time it had limited functions such as making calls and possibly sending text messages, then it gradually changes from there towards these technology, as the names says smart phones are multifunction device which allows its users variety of options such as making phone calls, text, browsing the net, or playing games basically it allows the users to learn and earn while having fun at the same time with that options in mind this makes the popular target from the today's society.(occurring article named: eMarketer.com ) There is no doubt that smart...

Words: 1881 - Pages: 8