Part 1
One of the technologies that will have a great impact on telecommunications and networking security is quantum cryptography technologies. The quantum cryptography technology has been utilized in several ways in a bid to increase network security (Vazirani & Vidick 2014). For example, the Quantum Key Distribution is quite effective in increasing security during communication between two parties. QKD prevents eavesdropping by allowing sharing of a randomly-generated security key and detecting any third parties that may try to gain access to the communication network. Quantum cryptography has been used to detect Trojan horse-based attacks and blinding attacks. The technology has great promises in providing security for unsecured wireless networks. Its application in wireless network security is also based on the technologies ability to encode information as polarized photons. Other ways where the technology is used include the Device-independent quantum cryptography, Post-quantum cryptography, position-based quantum cryptography.
Part 2
One of the concerns with mobile devices and security is lost and stolen devices. Although mobile devices are ideal travel companions because they are extremely lightweight and easily portable, they are also easy to lose or steal (Souppaya & Scarfone 2013). Physical access can be gained through such devices increasing the risk of making organization’s private information open and accessible. Another concern with mobile devices is malicious codes. Mobile devices are susceptible to mobile malware such as Trojans delivered through weaponized links and text messages. The attack application spreads to other devices as well as in the phone network. Another concern is device attack. The attacks can be informed of buffer overflow exploitations or browser-based attacks. The risk for the organization is that their data can be accessed from the device or an avenue for distributed denial of service attack. One of the security solutions for mobile devices is intrusion prevention. Intrusion prevention will detect attacks and block them before they can reach the device.
Reference
Vazirani, U. & Vidick, T. (2014) Full Device-Independent Quantum key Distribution. Physical Review Letters 113:140501-140506
https://people.eecs.berkeley.edu/~vazirani/pubs/diqkd.pdf
Souppaya, M. & Scarfone, K. (2013) Guidelines for Managing the Security of Mobile devices in the Enterprise. National Institute of Standards and Technology, Sp-800-124.
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf