Thursday, June 13, 2019

The current State of Security in Smartphone Term Paper

The current State of Security in Smartphone - Term Paper ExampleMobile technology is the latest battlefield that has been exploited by malicious intent users, like hackers, intruders etcetera to achieve personal gains from jeopardizing the security of the legitimate users. This paper shall address the prevailing security threats that are witnessed in Smartphone technology alongside the technologies that are used to protect the devices from such threats. 2. Security in Smartphone The security threats that revolved around computers have migrated into the Smartphone domain and causing loaded down(p) losses to the users. To highlight the relevance of security measures on smartphones, Cheng (2011) provided results from a survey that was conducted by McAfee in the current year. The survey revealed that malware instances for Android (one of the most familiar smartphones in the current times) have increased by a signifi firet figure of 76% in the last four months. Malware is defined as a ny computer programme or application that is developed for the purpose of performing illicit activities, such as Trojans, viruses and worms. Some of the examples of security threats in smartphones are given below 2.1 Smishing Phishing attacks had been know to cause harm to personal computers but a similar security threat is prevailing in the current times that is directed to harm smartphone- smishing and vishing. Ruggiero and Foote (2011) utter that hackers use the conventional onward motion of sending fake messages or voicemails to the recipients and urge them to call a financial institution with the aim to update their security settings etc. Voicemail systems are activated on the respective fake hosts that record sensitive information of the recipient. 2.2 Baseband Hacking Hackers have invented ways to intercept cellular phone calls by devising the chips and firmware compromised in the Smartphone. Cheng (2011) stated that the baseband processor of the phone is turned into a li stening device and enables the hackers to record conversation taking place between the participants. This can serve to record sensitive information and thus be used for malicious intent. 2.3 Infected Applications Applications are the most attractive feature of smartphones since they allow an private to perform a diverse range of operations, for example play games, browse the web etc. Applications have also become one of the most common modes of infecting smartphones with compromised programs, such as Trojans. Apple and Blackberry follow a procedure of exhibit the applications (that might be contributed by developers) before publishing them on their App stores this approach makes them avoid many Trojan attacks that might be hidden in the programs. Android follows a different approach and does not perform any screening process on the applications. Chang (2011) stated that an Android application with the name of Steamy Window has the power to convert a Smartphone into a botnet zombie. Upon successful acquisition of maneuver over the phone, the hacker can perform any desired operation, such as Send messages to any contact Make the browser point to compromised sites that whitethorn facilitate the transmission of sensitive information. Block the receiving of messages. 2.4 Jailbreaking and Rooting Apple IPhone School (2010) explains jail breaking as the hacking activity of the iPhone, iPad and iPod that allows the individual to have access to the Unix accuse system. Jailbreaking an iPhone is analogous to rooting an Android phone. Ngo (2009) stated that

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.