Question

In: Economics

What types of threats do smartphones face? Are there any particular vulnerabilities to mobile devices What...

What types of threats do smartphones face?

Are there any particular vulnerabilities to mobile devices

What qualities of apps make them a vulnerable security point in smartphone use

Are apps more or less likely to be subject to threats than traditional P C software programs?

Solutions

Expert Solution

A. There are various types of threats that smartphones face. Let's discuss it one by one:


1. Spyware : Spyware picks data about you based on the use of your internet service and transmits it to a third party, who sell it to various companies. These companies, in turn, use your data for sending you advertisements. Spyware also collects information about your location, internet usage and even reach your contacts.


2. Viruses and Trojans : There is also threat of viruses and Trojans to your mobile phones. They typically attached with legitimate programs. Viruses and Trojans can hijack mobile phones and mine the important information like banking information, stock market or any personal information.


3. Drive-by downloads: It is a malware installed on your device without your knowledge. It can come to your mobile phone when you visit wrong website or open a wrong email.


4. Phishing apps : Phishing apps look like real apps, that secretly collect the information you enter such as passwords, account numbers, secret codes and many more.


B. Are there any particular vulnerabilities to mobile devices ?


Yes, the particular vulnerabilities to mobile devices are:


Weak Password Setting for the device: A mobile when stolen by a thief can not be opened by him if it is strongly password protected. So you should protect your device with a very strong password. All applications stored inside your mobile should be password protected so that it can't be accessible to a wrong man.


Unnecessary storage of important information: Nowadays everybody wants to keep their important information within their finger tips. But it is risky to store all your important information in your mobile phones that may be hacked. Don't store any passwords of your important information in your mobile phones.


Access to unauthorized person : Don't let other people to access your mobile phone, they may try to collect important information about you. So always keep your phone in a safety place and carry it carefully.


Besides this use of unauthorized content, interaction with other systems, use of unknown applications, use of public/unsecured networks or devices can create problems for your mobile phones.


C. What qualities of apps make them a vulnerable security point in smartphone use?


Apps need to be more secured and user should be alert while downloading any app to their mobile phones.


Code need to be very strong: The developers should be very careful while designing apps, they should use strong codes to protect their apps from various threats. Before releasing any app to the market, the owner should check its security and application thoroughly.


There should be a trusted site for downloading apps : Many people do a mistake while downloading apps, they don't check whether the site is a trusted one or not. As a result of which their devices are affected by the viruses.


D. Are apps more or less likely to be subject to threats than traditional P C software programs?


Yes, apps are more likely to be subject to threat compared to traditional PC software programs. Because there are huge number of apps applied in mobile phones which can be used anytime and anywhere. People are so busy in using these apps that they don't even read any information and policies of these apps before installing. There are some apps in which its use is not clearly mentioned and people are easily captured by the hackers.



Related Solutions

What do you believe are the potential uses of mobile devices (for example, smartphones or tablets)...
What do you believe are the potential uses of mobile devices (for example, smartphones or tablets) in assessment? What are the pros and cons of such technology?
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
in your opinion what additional accessibility problems do mobile devices pose?
in your opinion what additional accessibility problems do mobile devices pose?
What security threats do organisations face in their e-business operations? What are the potential consequences of...
What security threats do organisations face in their e-business operations? What are the potential consequences of these threats for organisations? Why are the actual consequences often less severe than the potential consequences? How do organisations use management strategies to address security threats?
What security threats do organisations face in their e-business operations? What are the potential consequences of...
What security threats do organisations face in their e-business operations? What are the potential consequences of these threats for organisations? Why are the actual consequences often less severe than the potential consequences? How do organisations use management strategies to address security threats?
Do you consider computers and mobile devices to be harmful to your health? why or why...
Do you consider computers and mobile devices to be harmful to your health? why or why not?   Would you change your electronic device usage or rearrange your computer work area to minimize your risk?   Why? or why not?   What modifications can you make?
Mobile Application Security What is the basic purpose of this technology? In what types of mobile...
Mobile Application Security What is the basic purpose of this technology? In what types of mobile applications can this technology be effectively used and why? What are the pros and cons of this technology? Are there any other important aspects of this technology that should be provided?
1. Why is it important for mobile workers and users to know what the risks, threats,...
1. Why is it important for mobile workers and users to know what the risks, threats, and vulnerabilities are when conducting remote access through the public Internet? 2. Why does the mock XYZ Health Care Provider need to define a remote access policy to properly implement remote access through the public Internet? 3. Why is a remote access policy definition a best practice for handling remote employees and authorized users who require remote access from home or on business trips?...
What threats does Open-Panel Model HMO face?
What threats does Open-Panel Model HMO face?
Critically discussing any two types of ports (types, what they do, their mandates?
Critically discussing any two types of ports (types, what they do, their mandates?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT