Preview

Smart Phone

Satisfactory Essays
Open Document
Open Document
346 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Smart Phone
Security implications of the smart phone:
Smartphones are Micro-size computers and are just as vulnerable to viruses and other attacks as laptop or desktop. There are other security concerns that are unique to smartphones.
1. The most obvious threat to the security of our smartphones is falling into the wrong hands. For Smart phones we must use a secure password. A good password alone is not enough to protect, there is a line of software that will help us to recover it, or wipe the data if we are unable to do so. The first step is a piece of software that will lock phone down. This software will turn off the phone's screen and disable it, preventing an attacker from being able to easily access the phone.
2. The free Wi-Fi available at many coffee shops and other locations is often unencrypted, and should not be used to transmit sensitive data. For sending banking or personal data, use the cellular network rather than Wi-Fi for the data connection.
3. By downloading strange email attachments or clicking links in spam mail, they can transmit viruses.
4. Some users jailbreak their iPhone so that they can switch wireless carriers or download software not available on Apple's official App Store. Apple tightly controls the software that's available on the App Store, and blocks apps that pose a security risk. Jail breaking the phone, however, opens a major avenue of attack for malicious software. Third-party malware apps disguised as innocent games and tools can easily steal personal and financial information. Malware isn't only a danger to jail broken iPhones. Other phones, like the Blackberry and Android phones, have a much wider array of apps available and don't have the central quality control of the Apple App Store. Should only download apps from sources we trust. Phones running the Android operating system are at particular risk. The open source nature of the platform means that there are a lot of amateurs writing Android apps, and poorly written software can

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 4 Questions IS3110

    • 398 Words
    • 1 Page

    Need to prevent eavesdropping on WLAN due to costumer privacy data access: protect against monitoring software, know what devices are present on your network and their software, and use encryption.…

    • 398 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Mobile Phone

    • 215 Words
    • 1 Page

    A company produces accessories for smart phones and tablets. The profit on each smart phone case is $2, and the profit on each tablet case is $3. The company made a profit of $1,200 on the cases last month. The equation 2x + 3y = 1,200 represents the company's profit from cases last month, where x is the number of smart phone cases sold and y is the number of tablet cases sold.…

    • 215 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Effective data encryption comes standard on your home network wireless router and information transmitted cannot be read without the correct encryption key. Password protection can be enabled on all devices and users should choose strong passwords of adequate length. Thefts of wireless devices are on the rise. Users can learn ways protect themselves and the device from crime, and make a loss or theft known the employer or carrier for fast action.…

    • 864 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    safeguard personal and business data. Mobile security apps can lock a mobile device remotely, erase its…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Smart Phones

    • 296 Words
    • 2 Pages

    The fourth generation cellular speeds will most likely be 3 mbps to 5 mbps. This is still an improvement over 3g.…

    • 296 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Mobile Phone

    • 608 Words
    • 3 Pages

    It is clear that mobile phones are an invasion of privacy as they can be hacked, giving criminals access to your data which increasingly is coming to contain financial access data such as credit card numbers, bank account numbers and etc. It is also possible for criminals to “clone” phones, or for them to steal your phone and modify the chip, allowing your details to be used outside your network area. Hackers are now seeing these devices as a new way of making money, a new way of getting data about people. The cell phone hacker can even access your camera phone and speaker, to keep track of your every move.…

    • 608 Words
    • 3 Pages
    Good Essays
  • Better Essays

    There are various security threats for the various mobile devices that we all use on a daily basis. Smartphones are outselling PCs and the lack of adequate security for these devices and other mobile devices leave them vulnerable targets for hackers and other cyber criminals. As the number of attacks increase, the strategies, mitigating solutions and other countermeasures are not keeping up to prevent these attacks. This case study will examine and explore mobile device security and other threats related to computer security.…

    • 1136 Words
    • 4 Pages
    Better Essays
  • Better Essays

    The term mobile devices are not limited to cellphones; they include iPads, iPods, Laptops, PDAs and e-Readers. These devices act as a lifeline to the outdoor world, and are frequently used for navigating, social networking, shopping, banking and business purposes. What is often forgotten about these devices is that they are gateways to hackers. “Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone,” (Certic, 2013). Mobile Technology became widely accepted by most of the world in the early 1980’s and since then, the evolution of technology has shown substantial growth. “Worldwide smartphone sales reached 144.4 million units in the first quarter, a 45% increase year over year, research firm Gartner reported. Tablet shipments jumped 120%, to 17.4 million units worldwide, according to a report from research company IDC,” (Drew, 2012). In 2013, over 80% of the world’s population uses a mobile phone and to date there are more than 6 billion mobile devices in the world. Concerns regarding cancer in relation to frequent use and security risks associated with the ability to protect the user’s information are controversial.…

    • 1441 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Cybercriminals

    • 1700 Words
    • 7 Pages

    Cellphones carry the same threats as computers and tablets, especially since most cell phones are smart phones and have internet capabilities. Cell phones can be a good way for students to get into contact with the adults in their lives, they can also be used by cyber bullies, and criminals to take advantage of unknowing children. Unfortunately another issue and major crime is easily assessable on cell phones. sexting.…

    • 1700 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Embedding Wi-Fi into smartphones is another way for hackers to gain access to information easily. If a smartphone has Wi-Fi enabled, it means that it can connect to a number of access points or “hotspots” to access the internet, just like a PC would. Alternatively, this also means that it opens it up so that a hacker looking for information can access that smartphone though a computer with more ease than going through Bluetooth. Once a hacker has linked up to a smartphone…

    • 913 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Being Hacked

    • 494 Words
    • 2 Pages

    There are many ways to prevent your personal information from being hacked. In passage two, paragraph nine states "Apps that make strange or exaggerated demands for access perhaps should not be installed." This statement explains that any app that asks for permission in a suspicious way should not be downloaded because it is possible you could get hacked. Apps like this will most likely steal your information without permission. It is very important you know what information is stored on your phone before you install anything because it can damage your device for good.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Landman, M. (2010). “Managing Smart Phone Security Risks”. 2010 Information Security Curriculum Development Conference. New York, NY: ACM.…

    • 2941 Words
    • 12 Pages
    Good Essays
  • Good Essays

    IOS Vs Android

    • 593 Words
    • 2 Pages

    Nowadays society, your smartphone goes almost everywhere with you. Along the way, smartphone collects all the kind of personal information of you, such as pictures, finical accounts and messages. Thus, the secretive of smartphone is definitely worth users to pay attention of. Android is the commonest…

    • 593 Words
    • 2 Pages
    Good Essays