Security in Smartphones

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
(Creating Security in Smartphones wiki page as part of 4C03 research project.)
Line 5: Line 5:
== Security Issues in Smartphones Versus in Desktops ==
== Security Issues in Smartphones Versus in Desktops ==
== References ==
== References ==
 +
1. Espenschied, Jon. "Ten dangerous claims about smart phone security." Computerworld. 27 Mar. 2007. 5 Apr. 2009 <http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9014118>.
 +
 +
2. Hughes, Steven. "How do you handle mobile security?" SmartphoneMag.com. 1 Aug. 2007. 5 Apr. 2009 <http://www.smartphonemag.com/cms/blogs/38/how_do_you_handle_mobile_security>.
 +
 +
3. Mills, Elinor. "Mobile: The holy grail at security conference." CNET News. 20 Mar. 2009. 5 Apr. 2009 <http://news.cnet.com/security/?keyword=smartphones>.
 +
 +
4. Phifer, Lisa. "Smartphone security: The growing threat of mobile malware." SearchSecurity. 11 Mar. 2008. 5 Apr. 2009 <http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1337531,00.html>.
 +
 +
5. "SPY FAQ." FlexiSPY. 5 Apr. 2009 <http://www.flexispy.com/faq.htm#03>.
 +
 +
6. Temporale, Mike. "Smartphones: productivity booster or security time bomb?" Computing Unplugged Magazine. 5 Apr. 2009 <http://www.computingunplugged.com/issues/issue200805/00002179002>.
== See Also ==
== See Also ==
== External Links ==
== External Links ==
--[[User:Asokanp|Asokanp]] 20:00, 12 April 2009 (EDT)
--[[User:Asokanp|Asokanp]] 20:00, 12 April 2009 (EDT)

Revision as of 02:01, 13 April 2009

Security in smartphones is a serious concern today with the increasing number of people who use it for personal and corporate purposes. Previously, smartphones employed a default-deny security model as every feature was built to provide specific services. Now, the devices are built to enable a variety of extraneous services to be run on them. This is equivalent to a default-allow model, which poses a major security risk. These risks are increased due to the fact that most smartphones enable connections to the internet or other networks that may be accessible to outsiders. This connectivity provides a channel for attackers to send or extract information from the devices. Smartphones are much more likely to be lost or stolen than desktops and laptops, which raises the issue of authenticating the identity of the user and being able to remotely lock and wipe the device.

Contents

Threats

Defense Mechanisms

Security Issues in Smartphones Versus in Desktops

References

1. Espenschied, Jon. "Ten dangerous claims about smart phone security." Computerworld. 27 Mar. 2007. 5 Apr. 2009 <http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9014118>.

2. Hughes, Steven. "How do you handle mobile security?" SmartphoneMag.com. 1 Aug. 2007. 5 Apr. 2009 <http://www.smartphonemag.com/cms/blogs/38/how_do_you_handle_mobile_security>.

3. Mills, Elinor. "Mobile: The holy grail at security conference." CNET News. 20 Mar. 2009. 5 Apr. 2009 <http://news.cnet.com/security/?keyword=smartphones>.

4. Phifer, Lisa. "Smartphone security: The growing threat of mobile malware." SearchSecurity. 11 Mar. 2008. 5 Apr. 2009 <http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1337531,00.html>.

5. "SPY FAQ." FlexiSPY. 5 Apr. 2009 <http://www.flexispy.com/faq.htm#03>.

6. Temporale, Mike. "Smartphones: productivity booster or security time bomb?" Computing Unplugged Magazine. 5 Apr. 2009 <http://www.computingunplugged.com/issues/issue200805/00002179002>.

See Also

External Links

--Asokanp 20:00, 12 April 2009 (EDT)

Personal tools