Preview

Mobile Security

Satisfactory Essays
Open Document
Open Document
539 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mobile Security
Mobile Smart Phone Security (HW 1)
Due Tuesday, December 4, 2012

Learning objective: identify security controls for mobile smartphone devices.

Security Scenario

Imagine that you own a smartphone (iphone with iOS or another phone with an Android OS). There have been many occasions where you would have liked to make purchases or conduct mobile banking using your smartphone, but you are concerned its security. You have decided to research the security provided on your phone, as well as the security apps available that could further strengthen your smartphone’s security.

Instructions

Note: If you have a smartphone, use that smartphone as the basis of your research for this assignment. If you do not have a smartphone, pick a smartphone to research: either an iPhone or an Android device.

* State the name and version of your smartphone hardware and the operating system (O/S) version of your smartphone.

* Consult the user manual and view the settings for your smart phone and In approximately 2 sentences, briefly summarize the security features that come with (i.e., are built into, or come pre-installed on) your smartphone.

* For this assignment, you are to identify a security technology for your smartphone for each of the requirements in the table below. In general, when searching for technological solutions, consult reputable sources. Enter your answers directly in the table. (Delete the rest of the instructions on this page.)

Requirement | Security Technology* | Brief Description** | 1. An anti-virus software that has automatic updates | | | 2. An anti-spyware software | | | 3. Encryption of email stored on your smartphone | | | 4. Encryption of data transmission (e.g., using SSL VPN) | | | 5. Password management and encryption on your smartphone | | | 6. Delete/clear cache stored on your smartphone*** | | | 7. Remote wipe data on your smartphone (e.g., if lost) | | |

* The

You May Also Find These Documents Helpful

  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Week6 Final Proposal

    • 1589 Words
    • 5 Pages

    The industry of smartphones has been rapidly increasing since the development of the touch screen and smarter technology for the mobile phone business. When touch screens and advanced 3G/4G technology was introduced, people trended away from flip-phones and Motorola © Razors to iPhones, Samsung Galaxies, Windows HTCs, and other substitutes.…

    • 1589 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    remote access it255

    • 345 Words
    • 2 Pages

    • The power of access points will be turned down to a minimum that still allows…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ruff Ryders

    • 724 Words
    • 3 Pages

    The most popular electronic device that is found in almost every single individuals hand in North America is a cell phone. People are dependent on it for almost every minute of the day, since technology has reached to a point where we can do absolutely anything with this magical wonder. They are used in urgent situations, along with helping people keep in touch with their loved ones. Overall, this is a remarkable device with many of its features to come in handy in everyone’s life.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Week 7 Research Paper Sun

    • 1241 Words
    • 4 Pages

    M.A. Badamas, (2001),"Mobile computer systems - security considerations", Information Management & Computer Security, Vol. 9 Iss: 3 pp. 134 – 136…

    • 1241 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    safeguard personal and business data. Mobile security apps can lock a mobile device remotely, erase its…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Securing Mobile Devices. (n.d.). Information Technology - Information Security – Information Assurance | ISACA. Retrieved from http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Securing-Mobile-Devices.aspx…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.…

    • 610 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Smartphone’s are extremely popular. Ninety-seven percent of all smartphone users use mobile applications. Fifty-eight percent of those smart phone users use location based applications. There were surveys done by a nonprofit global information security association called…

    • 2082 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Over the past two decades, we have witnessed significant technology advances in mobile devices, from the personal data assistants (PDAs) of the late 1990s and early 2000s to the ubiquitous and multifunctional smartphones of today. These advances have extended the virtual boundaries of the enterprise, blurring the lines between home and office and coworker and competitor by providing constant access to email, enabling new mobile business applications and allowing the access to, and storing of, sensitive company data.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Clark, R. (2014). Cyber security for smart mobile devices. Control Engineering, 61(8), 32-36. Retrieved from http://www.controleng.com/single-article/cyber-security-for-smart-mobile-devices/00767fbf028f3ac78fd519551fdc4c5e.html…

    • 1279 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    purpose statement

    • 162 Words
    • 1 Page

    The main purpose of this experiment will be to explore the security issues involved within the mobile device, to the end user. At this stage the study will be to test theory that explore the concepts involved in mobile device and cloud computing security where the users try to store their information. Security in mobile, user authentication and cloud computing security are independent variables that relates to dependent variables i.e. mobile devices, mediating the mobile computing for individuals. The independent variables can be defined as, security issues in mobile device, user’s information which are stored in mobile device and their problems and the cloud issues. The mediating variables is mobile computing which causes effect on dependent variables i.e. They can be defined which produce the outcome depending on the security, authentication and mobile cloud computing security.…

    • 162 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    informative speech

    • 911 Words
    • 4 Pages

    B. Background and Audience Relevance: Most people in this class have smart phones and most of those smart phones happen to be iPhones. iPhones can do more things than most people know, and now days most people cannot live without their iPhones.…

    • 911 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Abstract: Nowadays almost everyone is using smart phones. They are becoming an essential tool in human being’s everyday life. They are not only used for mere communication such as calling or sending text messages; however, they are also used in applications such as for accessing internet, receiving and sending emails and storing documents. As a result of this, not only phone numbers and addresses are stored in the mobile device but also financial information and business details which definitely should be kept private. And if the device is being stolen, each and every information is in the hands of the new owner. That’s why; the biggest challenge is the security. When it is necessary to confirm the user identity on systems to perform a given operation, the term User Authentication is used. Traditionally, people prove their identity by providing passwords. The average person today has about 25 password protected accounts (according to Microsoft study), more passwords than they can reasonably be expected to remember. People compensate by using the same password for multiple accounts, and by choosing passwords that are easy to remember. But, unfortunately easy to remember means easy to guess. Other user select difficult passwords but then write them down where unauthorized eyes can find them. That’s why, identity based on what you know (login and password) and what you have (ID cards) can be easily stolen. As we want trust (security), the notion what you are is a new opportunity to user authentication. Biometric Authentication is answer for that. Biometric is a characteristic of human being that distinguishes one person from another. For example, finger prints, retina, face recognition, etc. This can be used for identification or verification of identity. Keywords: FAR, FRR, ROC, EER, FTE, FTC. B.…

    • 2535 Words
    • 11 Pages
    Better Essays