Wednesday, November 20, 2019

The current State of Security in Smartphone Term Paper

The current State of Security in Smartphone - Term Paper Example Mobile technology is the latest domain that has been exploited by malicious intent users, like hackers, intruders etc, to achieve personal gains from jeopardizing the security of the legitimate users. This paper shall address the prevailing security threats that are witnessed in Smartphone technology alongside the technologies that are used to protect the devices from such threats. 2. Security in Smartphone The security threats that revolved around computers have migrated into the Smartphone domain and causing heavy losses to the users. To highlight the relevance of security measures on smartphones, Cheng (2011) provided results from a survey that was conducted by McAfee in the current year. The survey revealed that malware instances for Android (one of the most common smartphones in the current times) have increased by a significant figure of 76% in the last four months. Malware is defined as any program or application that is developed for the purpose of performing illicit activiti es, such as Trojans, viruses and worms. Some of the examples of security threats in smartphones are given below: 2.1 Smishing Phishing attacks had been known to cause harm to personal computers but a similar security threat is prevailing in the current times that is directed to harm smartphone- smishing and vishing. Ruggiero and Foote (2011) stated that hackers use the conventional approach of sending fake messages or voicemails to the recipients and urge them to call a financial institution with the aim to update their security settings etc. Voicemail systems are activated on the respective fake hosts that record sensitive information of the recipient. 2.2 Baseband Hacking Hackers have invented ways to intercept cellular phone calls by making the chips and firmware compromised in the Smartphone. Cheng (2011) stated that the baseband processor of the phone is turned into a listening device and enables the hackers to record conversation taking place between the participants. This can serve to record sensitive information and thus be used for malicious intent. 2.3 Infected Applications Applications are the most attractive feature of smartphones since they allow an individual to perform a diverse range of operations, for example play games, browse the web etc. Applications have also become one of the most common modes of infecting smartphones with compromised programs, such as Trojans. Apple and Blackberry follow a procedure of screening the applications (that might be contributed by developers) before publishing them on their App stores; this approach makes them avoid many Trojan attacks that might be hidden in the programs. Android follows a different approach and does not perform any screening process on the applications. Chang (2011) stated that an Android application with the name of â€Å"Steamy Window† has the power to convert a Smartphone into a botnet zombie. Upon successful acquisition of control over the phone, the hacker can perform any desired operation, such as: Send messages to any contact Make the browser point to compromised sites that may facilitate the transmission of sensitive information. Block the receiving of messages. 2.4 Jailbreaking and Rooting Apple IPhone School (2010) explains jail breaking as the hacking activity of the iPhone, iPad and iPod that allows the individual to have access to the Unix file system. Jailbreaking an iPhone is analogous to rooting an Android phone. Ngo (2009) stated that

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.