Preview

Mobile Phone Security

Good Essays
Open Document
Open Document
1564 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mobile Phone Security
Fact Sheet

Mobile Phone Security
This fact sheet has been developed for the Consumer Education Program by the Communications Commission of Kenya. It was compiled by studying material from various authoritative sources and adopting what is universally acceptable and relevant to the Kenyan situation. The fact sheet is intended to enable Consumers have a good understanding of the issues discussed and hence empower them when making decisions regarding ICT products and services. Introduction One of the biggest threats that a mobile phone user faces today is loss or theft of the phone. Not only is the mobile valued as a physical device, the phone may contain personal and financial data stored in the handset or in the phones subscriber identity module (SIM card). While a stolen SIM can be barred by a mobile network once the theft has been reported it is a bit harder to bar the handset from being used with different SIM card. Unless the user had protected his personal information with a PIN prior to the theft or loss of the phone, this data can be accessed by unauthorised persons. Mobile phone users normally store a wide range of information on their phones. This information can either be stored in the phone’s internal or external memory (depending on the make and model of the phone) or in the SIM card. The SIM card is used mainly to store contacts and short messages while the phone’s memory is used to store information such as personal photos, emails, and calendar items. In order to prevent unauthorised persons from using the phone and further gaining access to the stored information, some mobile phones have security features which the user can activate. This fact sheet has been developed to address security of the information stored and what to do should you lose the phone. Securing the information stored. There are at least two methods one can use to secure the information stored on a mobile phone. These are: a) SIM lock This method takes advantage of the SIM card

You May Also Find These Documents Helpful

  • Better Essays

    In today’s society the cell phone market is a huge competitive industry for cell phone companies. There have been studies that show that half the world has cell phone accounts. One attribute that defines the cell phone market is the idea of consumers is giving up their land line phones. This has caused a large influx of customers into the market for cell phones. As technology continues to advance, a variety of cell phones are developed and marketed to different areas across the nation. Cell phones are available for business and social purposes such as social networking, text messaging, retrieving e-mails and for playing games.…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    The cell phone policy I would create will not be broad for its usage. I will also put the responsibility into the users hand and will monitor it monthly. I would begin by including members of management, human resources, technology support, general staff and legal department. Discuss the current cell phone environment to determine the need of cell phones. That will create a list of eligible employees for either smartphones for data usage and applications or just cell. Distinguish rules for personal and business usage. Define the rules regarding texting and ensure employees may not automatically assume that the rules apply to texting. Loss of cell phones, appropriate use of the camera on the phone, cell phone use while driving and conversing about company information in public. Define consequences for violations. Make exceptions for emergencies and start off with warnings. Disseminate the information to employees, post written policies, listen to feedback from employees to adjust the policy and enforcement.. Make it a requirement for passwords.…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mobile phones can be easily lost or stolen. It is a good idea to set up a PIN lock on your…

    • 1176 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    cell phone privacy

    • 814 Words
    • 4 Pages

    Our cellphones today are just devices for spying on people across the country. The government looks in on phone records, text records, social media, and mostly everything on our cellular device. The things the government can do with cell phones are crazy as they can track our every move. Since the beginning of cellphones, the government has been tracking them and invading everyone’s privacy.…

    • 814 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In an article from the Washington Post, it is implied that there is no personal privacy within our technological world. Craig Timberg’s article, “Cellphones Used As Secret Trackers” startles the smartphone users of our society by revealing that their location can be found and tracked by anyone at anytime. This reminds me of the novel 1984 by George Orwell, in which privacy is nonexistent. There is an incredibly strict control of the people within this dystopian society and with the use of electronics, privacy can no longer survive. A notable quote from the book helps to describe the type of world the people live in, “If you want to keep a secret, you must also hide it from yourself” (Orwell 37). While it is great that our technology is advancing,…

    • 296 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Moller, S. (2011). On the need for different security methods on mobile phones. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, Sweden. 465-473. doi: 10.1145/2037373.2037442…

    • 781 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Mobile Phone

    • 608 Words
    • 3 Pages

    It is clear that mobile phones are an invasion of privacy as they can be hacked, giving criminals access to your data which increasingly is coming to contain financial access data such as credit card numbers, bank account numbers and etc. It is also possible for criminals to “clone” phones, or for them to steal your phone and modify the chip, allowing your details to be used outside your network area. Hackers are now seeing these devices as a new way of making money, a new way of getting data about people. The cell phone hacker can even access your camera phone and speaker, to keep track of your every move.…

    • 608 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Malware has become an increasing security threat. It is not only a security threat for mobile devices but for PCs also. Those persons responsible for developing and publishing malicious code and websites are getting more and more creative with hiding their criminal activities. Cybercriminals have been studying and researching new ways to hide their identities to avoid being captured and prosecuted. They are utilizing cryptography more and they are placing their servers in closed, anonymous spaces within the World Wide Web to avoid surveillance.…

    • 1136 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    purpose statement

    • 162 Words
    • 1 Page

    The main purpose of this experiment will be to explore the security issues involved within the mobile device, to the end user. At this stage the study will be to test theory that explore the concepts involved in mobile device and cloud computing security where the users try to store their information. Security in mobile, user authentication and cloud computing security are independent variables that relates to dependent variables i.e. mobile devices, mediating the mobile computing for individuals. The independent variables can be defined as, security issues in mobile device, user’s information which are stored in mobile device and their problems and the cloud issues. The mediating variables is mobile computing which causes effect on dependent variables i.e. They can be defined which produce the outcome depending on the security, authentication and mobile cloud computing security.…

    • 162 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Good Afternoon. I want to thank you all for coming out and spending the time with me to go over the topic of Why Banning the Use of Cell Phones Nationwide While Driving Should be Mandatory.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Good Essays

    GSM BASED CAR SECURITY

    • 572 Words
    • 3 Pages

    Working Principle:- The GSM based on car security system will consists of main features say the announciation protection against :-…

    • 572 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Androids Under Attacks

    • 1225 Words
    • 5 Pages

    Android & Co started in 1913 when Arthur and Clarence, both from the audit firm of Price bought out a small audit firm in Illinois to form Arthur, Clarence & Co, which became Androids & Co in 1918. Android headed the firm of Androids & Co until his death in 1945.Besides, Android who is founder of Androids & Co was a zealous supporter of high standards in the accounting industry. In 1945, Leonardo Sparky, who succeeded Android at the founder’s death, continued this emphasis on honesty. For many years, the Android’s motto was “Think Straight, Talk Straight”.…

    • 1225 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    This is a very controversial topic that has had many arguing about. Is Mobile Phones an Invasion of Privacy? Personally I think yes. People can track your sim card. This could also benefit many people. In many missing police cases, the police end up tracking the missing person’s phone and find out where their last place was. This can only work if the sim card is not corrupted or broken. Mobile phone tracking is set up using the SIM card, with an ID number that trackers can then enter online to view a real-time location. Although this can be legitimately initiated by asking permission from the phone user, the system is open to misuse. A journalist experimented by tracking his girlfriend – he set up the track while he was at home, then borrowed her mobile and accepted the trace (sending an acceptance message). Although the tracking company is legally required to send occasional warning messages to the trackee’s mobile, the journalist reported that none of the phones in his experiment received any such warnings.…

    • 354 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    There are over 35,000 mobile phone masts. A mobile phone mast is a cellular telephone site where antennae and electronic communications equipment are placed, to create a cell in a cellular network (a wireless network). Some campaigners argue that we should use telephones instead of mobiles, because there is evidence to support that the radiation from the phone masts which mobile phones use is dangerous.…

    • 750 Words
    • 3 Pages
    Good Essays