Preview

Smart Phone

Powerful Essays
Open Document
Open Document
2740 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Smart Phone
1. It has been said that a smartphone is “a microcomputer in your hand.” Discuss the security implications of this statement.?

--->Just a couple of years ago the biggest software concern we had about our cellphone was whether or not it could play Snakes. Today, smartphones have become a popular target among hackers and malware producers. It is a high-reward business because most people are unaware that their cellphone is just as vulnerable to cyber attacks as their desktop computer. Think about all of the things that you do on your cellphone, and then imagine a worst case scenario we can keep our cellphones, and our data, safe.
---->The most obvious threat to the security of our smartphones is simply for the device to falls into the wrong hands. As silly as this sound, most cases of smartphone data theft begins with a lost or stolen phone. The first line of defense is common sense. Don't put your phone down in a public place, and don't leave it where it is easily grabbed. In short, treat your phone as you would your wallet. In case your phone does get snatched by a passing evildoer, the next step is to make sure that you have a secure screen lock. For Blackberry, iOS and Windows phones use a secure password. Something that's easily remembered, but not easily guessed. If it includes personal information such as your name, birthday or address it is not safe. For Android users, make sure that your unlock pattern is relatively complex and crosses over itself. If not, somebody can deduce your pattern from the repeated smudge marks on your screen.

--->As with every computer, a good password alone is not enough to protect us. If our phone does get lost or stolen there is a line of software that will help you recover it, or wipe the data if you are unable to do so. The first step is a piece of software that will lock your phone down. This software will turn off the phone's screen and disable it, preventing an attacker from being able to easily access your

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Cited: 4. ”A clear-eyed guide to Android 's actual security risks." InfoWorld. N.p., n.d. Web. 27 Apr. 2014. <http://www.infoworld.com/d/mobile-technology/clear-eyed-guide-androids-actual-security-risks-232034>.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Expensive mobile phone handsets are desirable items, and so unfortunately are at risk from theft. Children and young people may be particularly vulnerable to such crime.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Mobile phones can be easily lost or stolen. It is a good idea to set up a PIN lock on your…

    • 1176 Words
    • 6 Pages
    Good Essays
  • Good Essays

    I would like to discuss the first video. As a child my mother got her credit card stolen. The $3,000 that was spent was refunded to her. But they didn’t spend $3,000 over night. The only reason why we were able to get the money back was because my mother checked her bank statement. Something we don’t do frequently enough (or at least I don’t). Another thing to do is to treat our iPhones and other smartphones like the tiny computer they are. We have so much information on our phones, and on apple devices you have the option to save your credit card number, security code, and expiration date to the device (to make shopping on your phone easier). But when you have sensitive information on your phone and you lose your phone, someone can access that information easily. We need to be protecting our money (and our identity) with more than just complex passwords, we also need to be checking our bank statements…

    • 465 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    safeguard personal and business data. Mobile security apps can lock a mobile device remotely, erase its…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    National Science Foundation. (2010). Can Clever Hackers Target Smart Phones? Retrieved August 27, 2010, from http://www.nsf.gov/news/news_summ.jsp?cntn_id=116723…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Good Essays

    As a user, you may not be unaware this is happening but it has a huge impact on data raiders. Even if someone breaks the encryption and attempts to read the information directly from the memory chips, all the person will see is useless, scrambled junk. Unless the person is able to recover the secret numbers stored in your device’s processor, guessing your passcode would not be of great help either. And Apple’s latest generation of iOS makes that very difficult. At the maximum, data thieves could get exhausted from trying all possible passcode…

    • 753 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Personal Device Policy

    • 822 Words
    • 4 Pages

    In order to prevent unauthorized access, devices must be password protected using the features of the device. The password must follow the company’s strong password policy.…

    • 822 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Social Security

    • 707 Words
    • 3 Pages

    The author stated in source 2 "Downloading and installing an application (or app, for short) could endanger your data privacy, too, if the app collects information from your cell phone without your permission. Some apps explicitly ask for permission to access your cell phone in different ways." This also means that some apps are not safe because they take in your personal information from your phone and your privacy is in danger. Hackers all over the internet waiting for something like this to happen because they see it as a opportunity When using the internet use the right websites so your personal information is…

    • 707 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Iphone Security Issues

    • 469 Words
    • 2 Pages

    Information breaks, hacking and device thievery is a standard piece of cutting edge life. So as to protect clients, Apple and Google added extremely viable security components to their phone working frameworks making them effectively unlockable. However, the FBI wants Apple to diminish advancements it has made on encryption programming, contending this is making it less demanding for fear based oppressors and different unsafe people to dodge identification.…

    • 469 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Everyday more smartphones are sold around the world, nowadays there are about 1 billion smartphones being used in the entire world. Now it is much easier and faster to share information, experiences, pictures and ideas to everyone. We are getting so used to all of these technologies that soon we will not be able to live without them anymore. But sometimes people overuse their devices and this can be very dangerous once you may lose all of your human interaction skills.…

    • 1777 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Being Hacked

    • 494 Words
    • 2 Pages

    There are many ways to prevent your personal information from being hacked. In passage two, paragraph nine states "Apps that make strange or exaggerated demands for access perhaps should not be installed." This statement explains that any app that asks for permission in a suspicious way should not be downloaded because it is possible you could get hacked. Apps like this will most likely steal your information without permission. It is very important you know what information is stored on your phone before you install anything because it can damage your device for good.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays