In: Computer Science
For this Discussion, you will analyze mobile security threats and evaluate countermeasures.
Briefly describe your mobile device and another device currently on the market that uses a different OS. Explain the security vulnerabilities associated with each device. Explain the security solutions that would address the vulnerabilities. Finally, state which OS has more robust security and explain your reasoning.
Mobile security threats that we face and can face in regular life are as follows:
Data Leaks - Methods through which unauthorized parties get access to the confidential information stored in our mobile devices is a very common case. Information like messages, images, VoIP, etc are easily compromised in today's time. Main reasons of this is "riskwares" or the apps which acts like the advertisements but gives access to unauthorized parties.The other ways are mobile devices purchased from unknown suppliers or brands which have inbuilt malicious softwares designed for data leaks.
Countermeasures for this are: Do not install unknown apps. Install a proper antivirus, update and run it regularly. Do not by phones of unknown brands and from unknown suppliers.
Unsecured WiFi - Free WiFi are the most enticing feature that attracts all mobile users. This not only provides free network access but also gives access to the hackers connected to the same. Studies show that users have compromised VoIPs, leaked credentials, hacked IDs because of accessing such WiFis.
Countermeasures are: Minimize the access to unsecured WiFi present in any locations.
Network Spoofing - False access points are designed by the hackers which appears to be the safe WiFi zones to localites and other users. These are deployed at busy paths and locations which high traffic so as to trap as many users and get access to their devices and data for malicious purposes.
Countermeasures are: Do not use the same credentials or the patterns for signing up on such public places.
My device is an Android Device providing various android facilities and securities in particular. It has an inbuilt security feature which can be pattern, password, fingerprints, etc. It provides various apps and different interfaces. It gives us connectivity facilities like mobile data, WiFi, hotspot , etc.
Another device can be laptop which has its own OS(Windows, Linux, Mac). It helps in different IT sectors and various user level works. Laptops are real fast in computing and have vast storage with higher computing speed as compared to humans. It provides connectivity facilities, software to ease human efforts in computing, etc.
The above mentioned are common to both. Some other are :
Phishing attacks - Making a fake website or providing information from fake emails which looks like a legit ones are very common in laptops that makes the pc vulnerable.
Malwares - Malicious software installed / deployed in the computer so as to get the confidentials or to hamper the work. Very common in laptops.
Cookie hijacking - Sessions are created when mobile and laptops connect to a server and are stored as cookies in laptops at user side to make the connection secure and fast. Hijacking makes the severs and the laptops at vulnerabilities.
Security solutions can be : Not providing our emails to others or visiting an unknown site. Installing and updating the antiviruses present in the devices for security. Deleting cookies if not in use.
Linux has the most secure feature as firstly it is open source so nothing is hidden or cannot be corrected at user level. Secondly no .EXE file is runnable at it avoiding malwares and other attacks possible as the are mostly installed by a .EXE file.