As with most areas of computing, security in mobile computing is a paramount concern. This includes securing the user’s information on the mobile device, encrypting the information during the transmission of the data to the server, and securely storing this information on the backend server. Security vulnerabilities in mobile computing may not only affect a user’s perception of an