Monday, April 29, 2019
The current State of Security in Smartphone Term Paper
The current State of Security in Smartphone - termination Paper ExampleMobile technology is the latest domain that has been exploited by malicious inclination users, like hackers, intruders etc, to achieve personal gains from jeopardizing the surety of the legitimate users. This paper shall address the predominate earnest threats that atomic number 18 witnessed in Smartphone technology alongside the technologies that are used to protect the devices from such threats. 2. Security in Smartphone The credentials threats that revolved around computers let migrated into the Smartphone domain and causing heavy losses to the users. To highlight the relevance of security measures on smartphones, Cheng (2011) provided results from a survey that was conducted by McAfee in the current year. The survey revealed that malware instances for Android (one of the around park smartphones in the current times) have increased by a significant figure of 76% in the last four months. Malware is def ined as both program or application that is developed for the habit of fareing illicit activities, such as Trojans, viruses and worms. Some of the examples of security threats in smartphones are given infra 2.1 Smishing Phishing attacks had been known to cause harm to personal computers but a similar security threat is prevailing in the current times that is directed to harm smartphone- smishing and vishing. Ruggiero and Foote (2011) stated that hackers use the conventional approach of send fake messages or voicemails to the recipients and urge them to call a financial institution with the aim to update their security settings etc. Voicemail systems are activated on the respective fake hosts that record sensitive information of the recipient. 2.2 Baseband Hacking Hackers have invented ways to intercept cellular phone calls by making the chips and firmware compromised in the Smartphone. Cheng (2011) stated that the baseband mainframe of the phone is turned into a listening devic e and enables the hackers to record conversation taking place amid the participants. This can serve to record sensitive information and thus be used for malicious intent. 2.3 septic Applications Applications are the most attractive feature of smartphones since they allow an individual to perform a diverse commit of operations, for example play games, browse the web etc. Applications have also become one of the most common modes of infecting smartphones with compromised programs, such as Trojans. Apple and Blackberry follow a procedure of screening the applications (that talent be contributed by developers) before publishing them on their App stores this approach makes them avoid many Trojan attacks that force be hidden in the programs. Android follows a different approach and does not perform any screening process on the applications. Chang (2011) stated that an Android application with the name of Steamy Window has the agency to convert a Smartphone into a botnet zombie. Upon successful acquisition of control over the phone, the hacker can perform any desired operation, such as Send messages to any contact Make the browser depute to compromised sites that may facilitate the transmission of sensitive information. Block the receiving of messages. 2.4 Jail faulting and Rooting Apple IPhone School (2010) explains jail breaking as the hacking activity of the iPhone, iPad and iPod that allows the individual to have access to the Unix file system. Jailbreaking an iPhone is analogous to rooting an Android phone. nongovernmental organization (2009) stated that
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment