MOBILE PHONE SECURITY
MOBILE SECURITY.
It is interesting to know that the average person in the world can own up to about two or more mobile phones. You would agree with me that without mobile phones in this time of the world, man can not do most things.Whether you like it or not it is true. Can you do away with your mobile phone for a month? I know some could try but they will definitely fail the test.
MARTIN COOPER |
Mobile phone was invented by a man named Martin Cooper 44 years ago.Now look at it today, everywhere in the world you will find a mobile phone.
You can also Read;Five things you should never post on Facebook
You can also Read;Five things you should never post on Facebook
Mobile security is the way of giving protection to your smart phones,lap tops, tablets and computers from threats and any other form of vulnerabilities associated with them.
Smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user. We use smart phones to communicate and also plan for our private lives and works.Within companies, these technologies are causing too much of a change in the organization of information systems hence they have become a new source of risks.The mobile phone, especially the smart phone as well as computers are exposed to a lot of target attacks. These attacks exploit the weaknesses in the smart phones or computers that may be in the form of a text message, an email or MMS.
Challenges involved in Mobile phone Security.
There are countless number of challenges or threats that mobile phone users are been exposed to.These sort of threats damage the operation system of the phone and can also modify or transmit user data.
The bad guys target three areas concerning mobile usage.
Smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user. We use smart phones to communicate and also plan for our private lives and works.Within companies, these technologies are causing too much of a change in the organization of information systems hence they have become a new source of risks.The mobile phone, especially the smart phone as well as computers are exposed to a lot of target attacks. These attacks exploit the weaknesses in the smart phones or computers that may be in the form of a text message, an email or MMS.
Challenges involved in Mobile phone Security.
There are countless number of challenges or threats that mobile phone users are been exposed to.These sort of threats damage the operation system of the phone and can also modify or transmit user data.
A Smart phone |
The bad guys target three areas concerning mobile usage.
- Data: Mobile phones are data management devices and may contain sensitive data such as private information, call logs, credit card numbers, authentic information and the like.The bad guys may steal some of these important details of you or of your company or work.
- Availability:When the bad guys attack your mobile phone, they deprive the owner of its usage and therefore you will have a limited access to it.
- Identity: Smart phone is indisputably a device which is highly customizable in which the contents of it is associated with a specific personality.Every mobile phone gives information about its owner and the bad guys may steal these information in order to do other offenses.
When a mobile phone is being targeted by the bad guys, they do a lot of things to the phone when they succeed.
- They control the phone, communicate with it, send commands in a form of spam via messages or emails to the phone.
- They force the phone to make phone calls as if it were the owner.
- The can discharge the phone's battery thereby reducing its usage.
- They steal the user's identity in order to impersonate them. This point raises a security concern especially in countries where phones are used to place orders,check bank accounts information or used as an identity card.
- The attacker can make the phone record the conversation between the owner and others which can be sent to a third party.
- They can also remove the photos, videos, music,contacts, calendar and other professional data of the owner.
This is a just a few of what the bad guys( hackers,crackers,key loggers etc) can do to your smart phone.
Thanks for reading this article.
Do not forget to share this article by using the social network floating button at the left side or below this article.
0 comments:
Post a Comment