What is Mobile?
Mobile Security concerns :
A Mobile Phone is a wireless handheld device that allows users to make calls and send
text, among other features. The earliest
generation of mobile phones could only make and receive calls. Today’s
mobile phones, however, are packed with many additional
features,
such as Web browsers, games, cameras, video players and even navigational
systems. A mobile phone may also be known as a cellular phone or simply cell
phone.
Uses of Mobile :
What is Mobile Security?
Mobile
security is the protection of smart phones, tablets, laptops and other portable
computing devices, and the networks they connect to, from threats and
vulnerabilities associated with wireless computing. Mobile security is also
known as wireless security.
Mobile Security concerns :
1. Device loss :
If an
employee leaves a tablet or smart phone in a taxi cab or at a restaurant,
for example, sensitive data, such as customer information or
corporate intellectual property, can be put at risk.
2. Application Security :
One
problem is mobile apps that request too many privileges, which allows them to
access various data sources on the device.
3. Device data leakage :
Nearly
all of the chief concerns identified in the mobile security survey, from data
loss and theft to malicious applications and mobile malware, are sources of
data leakage. While most corporate access privileges on mobile devices remain
limited to calendar items and email, new mobile business applications can tap
into a variety of sources, if the enterprise accepts the risks.
4. Malware attacks :
the vast
majority of mobile malware to be SMS Trojans, designed to charge device owners
premium text messages. Another concern is malicious or Trojan -infected
applications that are designed to look like they perform normally, but secretly
upload sensitive data to a remote server.
5. Device theft :
Smartphone
theft is a common problem for owners of highly coveted smart phones such as the
iPhone or
high-end Android devices. The danger of corporate data, such as account
credentials and access to email, falling into the hands of a tech-savvy thief.
Different types of Mobile Security :
1. Network access control
2. Virtual Private Network
3. Organization Device
4. Password Protection
1. Network access control :
Network
access control involves the use of a protocol or defined set of rules for user
access to a network. Users access a network based on a defined set of security
policies that are enforced by an organization. The policies use a protocol to
define the device access as well as what the end user can do with the mobile
device on the network.
2. Virtual Private Network :
Virtual
private networks are networks that provide encryption and security applications
that ensure only authorized users can access the network. A virtual private
network is accessed through a browser and Internet connection and does not
require additional software installation on the devices of the end users. Users
access and share data securely through the encryption and security applications
that are stored on the virtual private network.
3. Organization Device :
The
number of workers that use their own handheld devices to connect to the
organization network is of growing concern when it comes to security risks. As
a result, most organizations are issuing their own devices for the workers to
use remotely to access the company network. Although this security method is
more costly to implement, the cost of security breaches to sensitive and
confidential data outweigh the cost of device implementation.
4. Password Protection :
More
organizations are password protecting their mobile devices for added security.
This is especially important for PDAs because they are capable of holding more
data than a cellular phone. The problem with password protection is monitoring
workers to ensure that they are abiding by the password protection process and
not using shortcuts like programs that automatically log you into the device or
program.
Different types of Mobile Screen locks :
1. Slide to Unlock :
This lock
screen is not secure by any means, and only asks that the user of the phone
grab the circle with a lock inside and slide it outside of a larger circle to
unlock the phone. There are no passwords or patterns, it’s simply a way to keep
your phone from turning itself on and then accessing all sorts of info in your
pocket or purse without your knowing.
2. Face Unlock :
With Face
Unlock setup, you wake your phone and then set point your front facing camera
at your face. If it recognizes you, it will unlock almost immediately. If not,
it will ask that you complete your backup PIN or Pattern unlock.
3. Pattern, PIN and Password Unlock :
Pattern,
PIN and Password unlocks are exactly as they sound – you either create a
pattern, a numeric PIN, or an alpha-numeric password that needs to be entered
in order to unlock your phone. These are likely the most secure of them all. If
you don’t know the pattern, PIN, or password, you are not allowed to access the
phone.
Safer ways to use Mobile :
• Children should only
use cell phones next to their heads for emergencies.
Children’s skulls are thinner than adults’ and their brains are still
developing. Hence, radiation from cell phones penetrates more deeply into their
brains and is likely to cause more damage.
• While talking on your
cell phone, try to keep the cell phone away from your body as much as possible.
The
amplitude of the electromagnetic field (radiation) is one fourth the strength
at a distance of two inches and fifty times lower at three feet. Whenever possible, use the speaker-phone mode or a wired
headset.
• Avoid using your cell
phone when the signal is weak or when moving at high speed, such as
in a car or train, as this automatically increases power to a maximum as the
phone repeatedly attempts to connect to a new relay antenna.
• If you must carry your cell phone on you, make sure that the
keypad is positioned toward your body and the
back is positioned toward the outside so that the transmitted electromagnetic
fields move away from you rather than through you.