Preview

Smart Phone

Satisfactory Essays
Open Document
Open Document
346 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Smart Phone
Security implications of the smart phone:
Smartphones are Micro-size computers and are just as vulnerable to viruses and other attacks as laptop or desktop. There are other security concerns that are unique to smartphones.
1. The most obvious threat to the security of our smartphones is falling into the wrong hands. For Smart phones we must use a secure password. A good password alone is not enough to protect, there is a line of software that will help us to recover it, or wipe the data if we are unable to do so. The first step is a piece of software that will lock phone down. This software will turn off the phone's screen and disable it, preventing an attacker from being able to easily access the phone.
2. The free Wi-Fi available at many coffee shops and other locations is often unencrypted, and should not be used to transmit sensitive data. For sending banking or personal data, use the cellular network rather than Wi-Fi for the data connection.
3. By downloading strange email attachments or clicking links in spam mail, they can transmit viruses.
4. Some users jailbreak their iPhone so that they can switch wireless carriers or download software not available on Apple's official App Store. Apple tightly controls the software that's available on the App Store, and blocks apps that pose a security risk. Jail breaking the phone, however, opens a major avenue of attack for malicious software. Third-party malware apps disguised as innocent games and tools can easily steal personal and financial information. Malware isn't only a danger to jail broken iPhones. Other phones, like the Blackberry and Android phones, have a much wider array of apps available and don't have the central quality control of the Apple App Store. Should only download apps from sources we trust. Phones running the Android operating system are at particular risk. The open source nature of the platform means that there are a lot of amateurs writing Android apps, and poorly written software can

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 4 Questions IS3110

    • 398 Words
    • 1 Page

    User downloads and clicks on an unknown e-mail attachment: Effective email attachment filtering and restrictions reduce the likelihood of malicious content entering the network.…

    • 398 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Mobile Phone

    • 215 Words
    • 1 Page

    A company produces accessories for smart phones and tablets. The profit on each smart phone case is $2, and the profit on each tablet case is $3. The company made a profit of $1,200 on the cases last month. The equation 2x + 3y = 1,200 represents the company's profit from cases last month, where x is the number of smart phone cases sold and y is the number of tablet cases sold.…

    • 215 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Effective data encryption comes standard on your home network wireless router and information transmitted cannot be read without the correct encryption key. Password protection can be enabled on all devices and users should choose strong passwords of adequate length. Thefts of wireless devices are on the rise. Users can learn ways protect themselves and the device from crime, and make a loss or theft known the employer or carrier for fast action.…

    • 864 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    safeguard personal and business data. Mobile security apps can lock a mobile device remotely, erase its…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Smart Phones

    • 296 Words
    • 2 Pages

    The fourth generation cellular speeds will most likely be 3 mbps to 5 mbps. This is still an improvement over 3g.…

    • 296 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Moller, S. (2011). On the need for different security methods on mobile phones. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, Sweden. 465-473. doi: 10.1145/2037373.2037442…

    • 781 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Mobile Phone

    • 608 Words
    • 3 Pages

    It is clear that mobile phones are an invasion of privacy as they can be hacked, giving criminals access to your data which increasingly is coming to contain financial access data such as credit card numbers, bank account numbers and etc. It is also possible for criminals to “clone” phones, or for them to steal your phone and modify the chip, allowing your details to be used outside your network area. Hackers are now seeing these devices as a new way of making money, a new way of getting data about people. The cell phone hacker can even access your camera phone and speaker, to keep track of your every move.…

    • 608 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cybercriminals

    • 1700 Words
    • 7 Pages

    Cellphones carry the same threats as computers and tablets, especially since most cell phones are smart phones and have internet capabilities. Cell phones can be a good way for students to get into contact with the adults in their lives, they can also be used by cyber bullies, and criminals to take advantage of unknowing children. Unfortunately another issue and major crime is easily assessable on cell phones. sexting.…

    • 1700 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Smart Phone

    • 2740 Words
    • 11 Pages

    --->As with every computer, a good password alone is not enough to protect us. If our phone does get lost or stolen there is a line of software that will help you recover it, or wipe the data if you are unable to do so. The first step is a piece of software that will lock your phone down. This software will turn off the phone's screen and disable it, preventing an attacker from being able to easily access your…

    • 2740 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Embedding Wi-Fi into smartphones is another way for hackers to gain access to information easily. If a smartphone has Wi-Fi enabled, it means that it can connect to a number of access points or “hotspots” to access the internet, just like a PC would. Alternatively, this also means that it opens it up so that a hacker looking for information can access that smartphone though a computer with more ease than going through Bluetooth. Once a hacker has linked up to a smartphone…

    • 913 Words
    • 4 Pages
    Good Essays
  • Good Essays

    According to Wikipedia ” A smart phone is a mobile phone built on a mobile operating system, with more advanced computing capability than a feature phone”(1). There are many types of smartphones but they all have one thing in common. They combine the performance of a cell phone and a computer. In America 42% of phone users have smartphones (foot). Based on this staggering statistics, smartphones has an incredible possibility of affecting today’s society.…

    • 281 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IOS Vs Android

    • 593 Words
    • 2 Pages

    Nowadays society, your smartphone goes almost everywhere with you. Along the way, smartphone collects all the kind of personal information of you, such as pictures, finical accounts and messages. Thus, the secretive of smartphone is definitely worth users to pay attention of. Android is the commonest…

    • 593 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Being Hacked

    • 494 Words
    • 2 Pages

    There are many ways to prevent your personal information from being hacked. In passage two, paragraph nine states "Apps that make strange or exaggerated demands for access perhaps should not be installed." This statement explains that any app that asks for permission in a suspicious way should not be downloaded because it is possible you could get hacked. Apps like this will most likely steal your information without permission. It is very important you know what information is stored on your phone before you install anything because it can damage your device for good.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays