Smart Phone

Topics: Personal digital assistant, Smartphone, Windows Mobile Pages: 8 (2740 words) Published: August 16, 2012
1. It has been said that a smartphone is “a microcomputer in your hand.” Discuss the security implications of this statement.?

--->Just a couple of years ago the biggest software concern we had about our cellphone was whether or not it could play Snakes. Today, smartphones have become a popular target among hackers and malware producers. It is a high-reward business because most people are unaware that their cellphone is just as vulnerable to cyber attacks as their desktop computer. Think about all of the things that you do on your cellphone, and then imagine a worst case scenario we can keep our cellphones, and our data, safe. ---->The most obvious threat to the security of our smartphones is simply for the device to falls into the wrong hands. As silly as this sound, most cases of smartphone data theft begins with a lost or stolen phone. The first line of defense is common sense. Don't put your phone down in a public place, and don't leave it where it is easily grabbed. In short, treat your phone as you would your wallet. In case your phone does get snatched by a passing evildoer, the next step is to make sure that you have a secure screen lock. For Blackberry, iOS and Windows phones use a secure password. Something that's easily remembered, but not easily guessed. If it includes personal information such as your name, birthday or address it is not safe. For Android users, make sure that your unlock pattern is relatively complex and crosses over itself. If not, somebody can deduce your pattern from the repeated smudge marks on your screen.

--->As with every computer, a good password alone is not enough to protect us. If our phone does get lost or stolen there is a line of software that will help you recover it, or wipe the data if you are unable to do so. The first step is a piece of software that will lock your phone down. This software will turn off the phone's screen and disable it, preventing an attacker from being able to easily access your information through the phone's operating system. Most of these programs will also be able to lock down the phone's communication ports stopping people from simply plugging your phone into a computer and downloading the information that way. The next piece of software will turn on the GPS on your phone and lock it on. This way, as long as your phone has a battery with some life in it your phone will continuously broadcast its location. This can be a huge help in a situation where you have simply lost your phone. Activate this feature and your phone will pop up on a map making it a simple matter to locate it. In the case of a theft, you can provide the location to the police department, ---> Vastly increasing the odds of recovering your phone. The last ditch effort in the case of a lost or stolen phone is software that will completely wipe the memory. This is useful when other means of recovery have failed, and you have given up on hopes of recovering your phone. This software will remove all traces of personal information. In addition to the threat of losing physical control of your phone, there is the threat of malware. Smartphone malware is similar to the viruses and Trojans found on your home computers. Recently, Google had to remove 50 apps from their app store that they found to be malicious. These apps had already been downloaded to thousands of phones apiece. Apple and Amazon have also experienced malicious apps infiltrating their app stores. People get a false sense of security downloading programs from these large companies.

--->They assume that these corporations have already weeded out all of the bad apples, and only post the good. While this is certainly the goal, it is impossible to be 100% certain 100% of the time. Oftentimes, a software programmer's account will get hacked. The culprit will take down their legitimate app and replace it with a copy that contains malicious code. This is usually discovered within hours, but by then the app...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Smart Car Case Essay
  • Smart Phones Essay
  • Smart Car Essay
  • Smart Car Analysis Essay
  • Essay about Smart Phone
  • Smart Phones Essay
  • Smart phones Essay
  • Smart Phone Essay

Become a StudyMode Member

Sign Up - It's Free