blog




  • Essay / Mobile Security

    Table of ContentsLiterature ReviewLiterature Summary ReviewFuture ResearchFile PermissionConclusionLiterature ReviewMobile security, or more specifically mobile device security, has become increasingly important in mobile computing. The security of personal and professional information now stored on smartphones is of particular concern. More and more users and companies are using smartphones to communicate, but also to plan and organize the work but also the private lives of their users. Within companies, these technologies are leading to profound changes in the organization of information systems and have therefore become sources of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the user's privacy and the company's intellectual property. All smartphones, like computers, are prime targets for attacks. These attacks exploit the weaknesses inherent in smartphones which can come from the mode of communication, such as Short Message Service (SMS, also called text messaging), Multimedia Messaging Service (wifi, Bluetooth and GSM), the global standard for mobile communications. Say no to plagiarism. . Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get an original essay There are also exploits that target software vulnerabilities in the browser or operating system. And some malware relies on the average user's low knowledge. According to a 2008 McAfee study, 11.6% of users had heard of someone else being affected by mobile malware, but only 2.1% had personal experience with such a problem. However, this number is expected to increase. Security countermeasures are developed and applied to smartphones, from security in different layers of software to dissemination of information to end users. Literature Summary Mobile devices often do not have passwords enabled . Mobile devices often lack passwords to authenticate users and control access to data stored on the devices. Many devices have the technical capability to support passwords, personal identification numbers (PINs), or screen lock patterns for authentication. Some mobile devices also include a biometric reader to scan a fingerprint for authentication. However, anecdotal information indicates that consumers rarely use these mechanisms. Additionally, if users use a password or PIN, they often choose passwords or PINs that can be easily determined or bypassed, such as 1234 or 0000. Without a password or PIN to lock the device, there is an increased risk of stolen or lost phone information. could be accessed by unauthorized users who could view sensitive information and misuse mobile devices. Future Research Security in Operating Systems The first layer of security in a smartphone is the operating system (OS). Beyond the need to manage the usual roles of an operating system (e.g. resource management, scheduling processes) on the device, it must also establish the protocols to introduce external applications and data without introduce risk. File Authorization Since old Linux, there have also been file systems. mechanisms..