Preview

Personal Computer and Different Remote Servers

Good Essays
Open Document
Open Document
380 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personal Computer and Different Remote Servers
Think Your Smartphone is Secure?

1. What types of threats do smartphones face?

Based from the article I read, one of the threats being faced by smartphones is being hacked without the knowledge of users. Also, all of the personal and corporate data stored on the device could be sent through different remote servers, which are threats for smartphones. Additionally, another threat of smartphones is the user’s information may be taken without one’s permission especially the banking information.

2. Are there any particular vulnerabilities to this type of device?

One of the flaws to this type of device is security, because even though Apple and Google try to enhance their security, they could not avoid hacks and malwares among their apps. Since apps are softwares being used in smartphones, there could be many possibilities that this would be an avenue for hackers to place malwares to attack the users. To support my aforementioned statement, based from the article it was said that “apps are one avenue for security breaches.” I believe that smartphones would be much vulnerable when it comes to security.

3. What did Nicolas Seriot’s “Spyphone” prove?

Nicolas Seriot built an application for iOS users called “SpyPhone” which was capable of tracking users and all their activities, then, sending this data to different servers without the user (people) knowledge. The “SpyPhone” app proved that even smartphones are capable of being hacked and be inflicted with malicious software for as long as one is connected to the Internet.

4. Are apps more or less likely to be subject to threats than traditional PC software programs?

As of now, I believe that apps are more likely to be subject to threats than traditional PC software in the long run. It is because, today, people are diverting from the personal computer platform to the cellular platform. One can pay his or her bills through mobile devices or tablets. Another, one can book a flight using his or her

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    As our society realize more and more on technology like computers and smart phones to conduct every day things such as banking, work, school, and staying connected with family and friends, our personal information has become more vulnerable to attack. Before computers, if someone wants to steal your personal information they would need to break in to your house, work and car to try and get your information. Now everything about us are stored right on our computers from banking information, to medical information. Some of the most common forms of attack on Microsoft system are Trojan horse, backdoor, denial of service, robot/intermediary process, unprotected…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CIS 500 Term Papaer

    • 3105 Words
    • 10 Pages

    "Lookout 's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012…

    • 3105 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    - Hackers are always one step ahead antivirus software, so these software are not 100% safe…

    • 872 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Os Security

    • 369 Words
    • 2 Pages

    1. What are the relative advantages and disadvantages of at least three different measures used to protect operating systems?…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    In all societies and cultures there is or has always been a group that is identified as the center group. Most would like to believe that the center group is just toward the other groups that existed outside of the center groups but this is usual not the case, usually the center group tells about the perceived threat that the other groups present. This goes all the way back to the Middle Ages, were the center group at the time told or believed in the perceived threat of groups like the Lepers, Jews, Sodomites, Prostitutes, and Heretics.…

    • 1728 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    This article focuses in how devices can transmits a consumer private information to third parties, and how consumers have little knowledge that their information is kept in databases to be sold. In 2020 most home devices will interconnected both wire and wireless to each other across a network, giving unlimited potential to create personal profiles…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    government tracking

    • 1009 Words
    • 5 Pages

    Terry Allen’s article gives us a much stronger sense that cell phone tracking technology is…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Good Essays

    and internet on our phones even now we are just susceptible to not having our privacy. All the apps downloaded and no one ever reads every word of the terms they accept. There are lots of apps that could potentially turn on the camera without you knowing or accessing your txt and your history on your browser. Now people are doing all their banking though their cellphones. Are they really secure as the banks say they are?…

    • 529 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The growth of social networks and smartphones over the past few years has come with a dangerous side-effect: the violation of privacy and security. Social networks such as Facebook and Twitter may appear to be a fun way to keep in touch or to easily socialize with friends and family, but as these networks continue to grow some very serious privacy and security concerns emerge. Interestingly these concerns could be easily prevented by any educated user. The problem occurs when social network and smartphone companies force the average user to have to work towards gaining this education by hiding or not fully explaining some of their settings and features. One of the biggest cases of this is the recent emergence of coordinate-based apps on smartphones. In many of these apps, location services – a setting that allows the app to record the user’s exact coordinates at a given time – is turned on by default; the average user may never even be aware of its existence. This is not the only example of technology designed to follow people, there are many more new features being developed all the time to track and record an individual’s movements, despite their fun and harmless appearance; user education has become necessary for security.…

    • 1470 Words
    • 6 Pages
    Good Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    National Science Foundation. (2010). Can Clever Hackers Target Smart Phones? Retrieved August 27, 2010, from http://www.nsf.gov/news/news_summ.jsp?cntn_id=116723…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Better Essays

    References: Schwartz, M. J. (2012, January 17). From cyber espionage to Android malware, expect to see a greater variety and quantity of attacks than ever before. Retrieved from http://www.informationweek.com/security/vulnerabilities/10-security-trends-to-watch-in-2012/232400392…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As one example, the NSA has inserted its code into Android’s operating system … bugging three-quarters of the world’s smartphones. Google – or the NSA – can remotely turn on your phone’s camera and recorder at any time. Moreover, Google knows just about every WiFi password in the world … and so the NSA does as well, since it spies so widely on Google. But it’s not just the Android. In reality, the NSA can spy on just about everyone’s smart phone. Cell towers track where your phone is at any moment, and the major cell carriers, including Verizon and AT&T, responded to at least 1.3 million law enforcement requests for cell phone locations and other data in 2011. (And – given that your smartphone routinely sends your location information back to Apple or Google – it would be child’s play for the government to track your location that way.) Your iPhone, or other brand of smartphone is spying on virtually everything you do (ProPublica notes: “That’s No Phone. That’s My Tracker“). Remember, that might be happening even when your phone is turned off. The government might be spying on you through your computer’s webcam or microphone.…

    • 3244 Words
    • 13 Pages
    Good Essays
  • Good Essays

    Cybercriminals

    • 1700 Words
    • 7 Pages

    Cellphones carry the same threats as computers and tablets, especially since most cell phones are smart phones and have internet capabilities. Cell phones can be a good way for students to get into contact with the adults in their lives, they can also be used by cyber bullies, and criminals to take advantage of unknowing children. Unfortunately another issue and major crime is easily assessable on cell phones. sexting.…

    • 1700 Words
    • 7 Pages
    Good Essays