Preview

Smartphone Security

Powerful Essays
Open Document
Open Document
2339 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Smartphone Security
Security Issues in Smartphone Markets
Are you buzzing about the new Verizon Blackberry Storm or the T Mobile G1? They are the new crave and everyone wants one right? What these owners many not know are the security risks that surround the raving technology. Most of the unawareness starts at companies and customers not placing more significance on security as smartphones get smarter. Although a smartphone may not be at greater risk than a PC, some security issues and risks are still present with PDA’s and smartphones.
In the United Kingdom, a whooping 800,000 people were the victim of mobile phone theft in 2006. Even though 90 percent of these phones deactivated within 48 hours, what happened to the other 10% of users that lost data to the crime. Smartphones are linked to the corporate network and are as vital as a laptop on the company network. Also, you cannot stop your employees from having accidents by underestimating these devices.
Mobile phone operators can stop SIM cards and stop expensive calls from being made. However, a smartphone differs from regular mobile phones. Executives carry all kinds of information on the device, from confidential announcements, to financial results and business in progress. If any of these were ever lost, it could result in the lost of business and trust within company IT infrastructures.
It is important to recognize the dangers before permitting a full mobile device network within the company. When sending emails, texts, and using smartphone applications may seem harmless, however your phone could be very vulnerable to hijacker attacks. We will explore some security issues that surround some of the primary smartphones leading the markets today and address how to mitigate users’ risk of being attacked.
Some of the issues that smartphones are having problems with securing encryption keys that can unlock cell phone holders’ private information. Digital signatures are also being compromised through man in the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    In today’s society the cell phone market is a huge competitive industry for cell phone companies. There have been studies that show that half the world has cell phone accounts. One attribute that defines the cell phone market is the idea of consumers is giving up their land line phones. This has caused a large influx of customers into the market for cell phones. As technology continues to advance, a variety of cell phones are developed and marketed to different areas across the nation. Cell phones are available for business and social purposes such as social networking, text messaging, retrieving e-mails and for playing games.…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Byod Pro's and Con's

    • 2327 Words
    • 10 Pages

    “Forrester Research reported in July of 2011 that nearly 60 percent of companies allow employees to use personal devices for work. “Bring Your Own Device (BYOD)” policies allow employees maximum choice and flexibility but raise new challenges in maintaining the personal privacy of the user, managing and securing valuable corporate information assets, and providing IT with an unpredictable and inconsistent mobile environment. There are also mobile technology considerations, while mobile devices are surpassing PCs and laptops as a user’s primary computing platform, they do have limited access to power, network and hardware resources. Devising a BYOD solution that will support both personal and business roles requires attention to all of these challenges”.…

    • 2327 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Week6 Final Proposal

    • 1589 Words
    • 5 Pages

    The industry of smartphones has been rapidly increasing since the development of the touch screen and smarter technology for the mobile phone business. When touch screens and advanced 3G/4G technology was introduced, people trended away from flip-phones and Motorola © Razors to iPhones, Samsung Galaxies, Windows HTCs, and other substitutes.…

    • 1589 Words
    • 5 Pages
    Better Essays
  • Good Essays

    A new feature available to wireless devices is the kill switch which downloads in minutes and will render the phone useless if the device is lost or stolen. Educate employees who bring their own device should have some kind of security software to protect sensitive data. Users should always keep their antivirus up to date so that malware, viruses, and spyware will not be a threat, and install security updates. Unsecured wireless networks should never be used because it puts the device at greater risk for identity theft. Shoppers should only buy phones from reputable dealers to ensure they are not getting a counterfeit…

    • 864 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Moller, S. (2011). On the need for different security methods on mobile phones. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, Sweden. 465-473. doi: 10.1145/2037373.2037442…

    • 781 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    References: Milligan, P., & Hutcheson, D. (2008). Business risks and security assessment for mobile devices, Audit and Control Association. www.isaca.org…

    • 610 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Mobile Phone

    • 608 Words
    • 3 Pages

    It is clear that mobile phones are an invasion of privacy as they can be hacked, giving criminals access to your data which increasingly is coming to contain financial access data such as credit card numbers, bank account numbers and etc. It is also possible for criminals to “clone” phones, or for them to steal your phone and modify the chip, allowing your details to be used outside your network area. Hackers are now seeing these devices as a new way of making money, a new way of getting data about people. The cell phone hacker can even access your camera phone and speaker, to keep track of your every move.…

    • 608 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It is important to keep in mind that people can be easily controlled by their smartphone. Eventhough a smartphone is used for work purposes, people need to worry about being addicted to their devices.…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Iphone Security Issues

    • 469 Words
    • 2 Pages

    Information breaks, hacking and device thievery is a standard piece of cutting edge life. So as to protect clients, Apple and Google added extremely viable security components to their phone working frameworks making them effectively unlockable. However, the FBI wants Apple to diminish advancements it has made on encryption programming, contending this is making it less demanding for fear based oppressors and different unsafe people to dodge identification.…

    • 469 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Digital Evidence

    • 342 Words
    • 2 Pages

    Information stored inside mobile phones such as phone numbers, calendar entries, text messages can be manipulated by employees or any personnel to commit crimes such as telemarketing fraud, pornography, stealing of company’s information or GPS location, etc. For example, a message was retrieved from a mobile phone which helped to acquit Patrick Lumumba in the murder of Meredith Kercher. (Trutv, n.d.).…

    • 342 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Smart Phone

    • 2740 Words
    • 11 Pages

    --->Just a couple of years ago the biggest software concern we had about our cellphone was whether or not it could play Snakes. Today, smartphones have become a popular target among hackers and malware producers. It is a high-reward business because most people are unaware that their cellphone is just as vulnerable to cyber attacks as their desktop computer. Think about all of the things that you do on your cellphone, and then imagine a worst case scenario we can keep our cellphones, and our data, safe.…

    • 2740 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    “They have an app for that” is the mantra of most smartphone users, but an improperly configured smartphone can be an open invitation to hackers looking for easy information. Today’s modern smartphone can do anything from controlling your home computer to handling your online banking to watching TV to making video calls. With all the features included in them, they are very easy to stockpile important (and sometimes sensitive) information about the user. Since smartphones are essentially tiny computers, they suffer the same vulnerabilities of PC’s, including viruses, malicious applications, and hacking. If there is the tiniest flaw in the smartphone’s armor, hackers can gain access and take an enormous amount of data from it.…

    • 913 Words
    • 4 Pages
    Good Essays

Related Topics