Smartphone Security Outline
-Brian B.
-Brian H.
-Karl A.
I. Intro
i. Smartphone’s and their use are here to stay
II. Simple Overview of Smartphone Operating Systems (chart)
i. Symbian
ii. Windows Mobile
iii. Blackberry OS
iv. Palm
III. Convergence of two computing platforms
i. Smartphone’s are getting increasingly more powerful
ii. They are broadband connected with all software productivity suites
IV. Think your smartphone is safe?
i. Vulnerabilities for relying on smartphone’s
ii. Security Risks to your business or personally if not taken serious by IT or yourself
iii. The ability to have Malware and spyware risks
iv. Viruses and ways they may infect smartphone’s
V. Cell Phone Viruses
i. Over 300 viruses today
ii. First virus was the Cabir virus
iii. How cell phones get viruses
VI. Hacking
i. Forms of hacking
ii. What hacking involves?
iii. Who has been hacked recently?
iv. Why do people hack?
VII. Security Provisions and Recommendations:
Companies:
Smart phone vendor and companies like Trust Digital, F-Secure, and Trend Micro are producing software and education on how to protect and fight against hackers and viruses.
VIII. Technology and Applications:
Smart phone users can use different applications and software to ensure that their information can be protected by hackers.
Software
Antivirus applications
F-Secure- Mobile Anti-Virus 3.0
Trend Micro-Trend Micro Mobile Security
Trust digital-FIPS 140-2
Encryption programs
Authentication passwords software
Messages protection software.
Hardware
Memory cards
PC hardware plug-ins
Being Smart:
The best protection of Smart phone security is not just technology, its education and training. Antivirus or no antivirus, users still need to be cautious and aware of the sensitive information being stored in their smart phones.
Being Aware:
Uploading and downloading to a PC, or date memory erasing are three ways users can store, save, and prevent information from being stole, misuse, and lost.
IX. Future of smart phone security:
Preparing for the fight.
According to Frost and Sullivan, an analyst firm, by 2010, there will be 72 million people whose jobs require them to perform work duties outside normal office work environment.
By 2010, 37 million users will use their mobile device to store information and data, both personal and professional.
Companies have to start treating smart phones with the same care they treat PCs and laptops, so taking these measures has become a necessity rather than a choice.
To have smart phone security is important and necessary because cell phones, PDAs and smart phones are all going to be part of our every day lives and routines.
Just like with the Pc, hackers and evil programmers are going to steal or make viruses that can affect your mobile and smart phone devices in the future. The question is, “How will you deal those problems when they are presented?”
Subscribe to:
Post Comments (Atom)
1 comment:
Nice outline of smart phone security issues, thanks ... The security suggestions are "obvious" but they are also the ones people are mosts likely to forget !!! Thanks. (And hey, maybe a smart phone in your bicycle helmet isn't a bad idea, especially if it gets the license number of the car with the kids in it who threw a beer can at you :) )
Post a Comment