Tuesday 26 April 2016

MOBILE AWERNESS AND SECURITY

What is Mobile?

A Mobile Phone is a wireless handheld device that allows users to make calls and send text, among other features. The earliest   generation of mobile phones could only make and receive calls. Today’s mobile phones, however, are packed with many additional
features, such as Web browsers, games, cameras, video players and even navigational systems. A mobile phone may also be known as a cellular phone or simply cell phone.


Uses of Mobile : 


What is Mobile Security? 

   Mobile security is the protection of smart phones, tablets,   laptops    and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.





 Mobile Security concerns :




1. Device loss :

If an employee leaves a tablet or smart phone in a taxi cab or at a restaurant, for example, sensitive data, such as customer information or corporate intellectual property, can be put at risk.

2. Application Security :

One problem is mobile apps that request too many privileges, which allows them to access various data sources on the device.

 3. Device data leakage :

Nearly all of the chief concerns identified in the mobile security survey, from data loss and theft to malicious applications and mobile malware, are sources of data leakage. While most corporate access privileges on mobile devices remain limited to calendar items and email, new mobile business applications can tap into a variety of sources, if the enterprise accepts the risks.


 4. Malware attacks :

the vast majority of mobile malware to be SMS Trojans, designed to charge device owners premium text messages. Another concern is malicious or Trojan -infected applications that are designed to look like they perform normally, but secretly upload sensitive data to a remote server.


 5. Device theft :

Smartphone theft is a common problem for owners of highly coveted smart phones such as the iPhone or high-end Android devices. The danger of corporate data, such as account credentials and access to email, falling into the hands of a tech-savvy thief.

 

 Different types of Mobile Security :
 
 1. Network access control
 2. Virtual Private Network
 3. Organization Device
 4. Password Protection  







1. Network access control :
 
Network access control involves the use of a protocol or defined set of rules for user access to a network. Users access a network based on a defined set of security policies that are enforced by an organization. The policies use a protocol to define the device access as well as what the end user can do with the mobile device on the network.


 2. Virtual Private Network :

Virtual private networks are networks that provide encryption and security applications that ensure only authorized users can access the network. A virtual private network is accessed through a browser and Internet connection and does not require additional software installation on the devices of the end users. Users access and share data securely through the encryption and security applications that are stored on the virtual private network.


 3. Organization Device  :

The number of workers that use their own handheld devices to connect to the organization network is of growing concern when it comes to security risks. As a result, most organizations are issuing their own devices for the workers to use remotely to access the company network. Although this security method is more costly to implement, the cost of security breaches to sensitive and confidential data outweigh the cost of device implementation.


4. Password Protection  :

More organizations are password protecting their mobile devices for added security. This is especially important for PDAs because they are capable of holding more data than a cellular phone. The problem with password protection is monitoring workers to ensure that they are abiding by the password protection process and not using shortcuts like programs that automatically log you into the device or program.


Different types of Mobile Screen locks :
   
1. Slide to Unlock :

 

This lock screen is not secure by any means, and only asks that the user of the phone grab the circle with a lock inside and slide it outside of a larger circle to unlock the phone. There are no passwords or patterns, it’s simply a way to keep your phone from turning itself on and then accessing all sorts of info in your pocket or purse without your knowing.







2. Face Unlock :

  



With Face Unlock setup, you wake your phone and then set point your front facing camera at your face. If it recognizes you, it will unlock almost immediately. If not, it will ask that you complete your backup PIN or Pattern unlock.








 3. Pattern, PIN and Password Unlock :

  
 Pattern, PIN and Password unlocks are exactly as they sound – you either create a pattern, a numeric PIN, or an alpha-numeric password that needs to be entered in order to unlock your phone. These are likely the most secure of them all. If you don’t know the pattern, PIN, or password, you are not allowed to access the phone.





Safer ways to use Mobile :

Children should only use cell phones next to their heads for emergencies. Children’s skulls are thinner than adults’ and their brains are still developing. Hence, radiation from cell phones penetrates more deeply into their brains and is likely to cause more damage.
 
While talking on your cell phone, try to keep the cell phone away from your body as much as possible. The amplitude of the electromagnetic field (radiation) is one fourth the strength at a distance of two inches and fifty times lower at three feet. Whenever possible, use the speaker-phone mode or a wired headset.
 
Avoid using your cell phone when the signal is weak or when moving at high speed, such as in a car or train, as this automatically increases power to a maximum as the phone repeatedly attempts to connect to a new relay antenna.
 
If you must carry your cell phone on you, make sure that the keypad is positioned toward your body and the back is positioned toward the outside so that the transmitted electromagnetic fields move away from you rather than through you.