Premium Essay

Smart Phone Securities

In:

Submitted By Bhogadi
Words 7043
Pages 29
Smartphone Security
Survey of U.S. consumers
Sponsored by AVG Technologies
Independently conducted by Ponemon Institute LLC Publication Date: March 2011

Ponemon Institute© Research Report

Smartphone Security
Survey of U.S. Consumers
Ponemon Institute, March 2011

Part 1. Introduction Ponemon Institute is pleased to present the findings of the Smartphone Security Survey: A Study of U.S. Consumers sponsored by AVG Technologies. The goal of the research is to determine consumers’ perceptions about the potential privacy and security risks when using their smartphones. In addition, we wanted to learn if participants in our study care about these risks and if they take security precautions. We surveyed 734 consumers who are 18 years and older and own a smartphone. The risks that we address in our survey concern location tracking, transmission of confidential payment without the user’s knowledge or consent, diallerware (specialized malware unique to smartphones), spyware, viruses from insecure WiFi networks and others. What we learned is that most of the consumers in our study are using their smartphones without understanding that they are exposing their sensitive information to the risks listed above. We also believe the findings of this study signal a potential security risk for organizations because so many consumers surveyed use their smartphones for both business and personal use. With business confidential information stored on these smartphones, organizations should make sure employees and contractors take appropriate precautions to secure such sensitive information. We also recommend that security policies state these precautions and ensure they are enforced. Following are the most salient research highlights:  Eighty-four percent use the same smartphone for both business and personal purposes. The cross over of business and personal usage means much

Similar Documents

Premium Essay

The Pros And Cons Of Mobile Phones

...Mobile phones attached to us and some of us might even feel very unbearable without having one no matter wherever we are in today's modern world, back in around late 1980's the very first mobile phone was available in the market for purchase off course not everyone was afforded to buy it at that time it had limited functions such as making calls and possibly sending text messages, then it gradually changes from there towards these technology, as the names says smart phones are multifunction device which allows its users variety of options such as making phone calls, text, browsing the net, or playing games basically it allows the users to learn and earn while having fun at the same time with that options in mind this makes the popular target from the today's society.(occurring article named: eMarketer.com ) There is no doubt that smart...

Words: 1881 - Pages: 8

Free Essay

Ifsm 201 Research Paper

...sporting portable laptop models, and people now have wireless devices which are both computer and phone combined. Those same devices are used to schedule doctors’ appointments, make bank transactions and buy goods within the cyber world. This whirlwind of technological change has created challenges in protecting personal data. Most users are not thinking security as they rush to purchase the “deal of the day” or conveniently look at x-rays that their physician sent over email. Unfortunately, this is a flawed mentality; important information whether on a device or in a file must be secured to protect an individual from identity theft. One might ask where the roads of technology, identity theft, and ethics intersect. That would be an easy answer. Scammers are anywhere and everywhere, use numerous technological systems to gather information to steal identities, and stealing from someone is not exactly ethical. These seedy individuals are starting to capitalize on the newest technologies while still making millions off of the old. For instance, unethical people may use smart phones application malware, email scams, telephone solicitation and credit card skimming devices, just to name a few, to bilk you of hard earned cash. All without being physically present when the theft happens. The following paragraphs will highlight how this happens starting with smart phones. Smart phones are big business. These devices are convenient little packages allowing access to information...

Words: 957 - Pages: 4

Premium Essay

Mobile

...applications have offered instantaneous, real-time efficiencies in our day-to-day life. Two generations ago you had to physically get up to change the channel on your television. Now you can talk into the remote control for channel changes and special programming. The same goes for banking. Everything is about speed of transaction and efficiency. Cash and credit card transactions are becoming obsolete with the advent of smartphone applications. Today you can shop, make purchases, and make bank deposits and transfers without leaving the comfort of your home. This paper explores how new technology and smartphone applications are used for mobile banking rendering cash, checking and credit card transactions obsolete. Keywords: Mobile Banking, Security, Cost and Benefits, Future Technology Mobile Banking “Making Cash, Checks, Credit Cards Obsolete” Mobile banking is becoming increasingly popular with over a billion mobile devices in use today. If you are a smartphone user, it’s not if you do mobile banking, it’s when or how you do mobile banking. Mobile banking has changed how users conduct purchases (micropayments and macropayment-small and big purchase items). “Mobile banking services are valued by users because of the inherent time and place independence, and the overall effort-saving qualities.” (Mallat, Rossi, Tuunainen, 2004). With the download of apps...

Words: 5012 - Pages: 21

Free Essay

Boa Banking of America

...cell phone, you may be able to set up mobile access for your bank account so that you can check your balance and transfer funds while on the road. Account security is another key benefit for mobile banking. While you are making transactions in business trip, you can also check your bank account on your cell phone for unauthorized transactions. To avoid that when you are getting home from a long trip, you discover that may have been a victim of fraud. Paying bills are the third feature of benefit. In current working environment, people are busy at work during the weekday, and therefore they may not have chance to handle their bills. Mobile banking offers a platform to access your bank account to pay your bills, such as utilities, credit card payments, and auto insurance. The last feature of benefit is that mobile banking offer complete security. People may wonder that what if cell phone is lost or have been stolen, the mobile banking will not as attractive as it should be. Thus, mobile banking encrypts your information, and adds more security on your account, which the service must be set up from a computer. Moreover, the phone can only store limited personal banking information, in case the phone is lost or stolen. Even though mobile banking offers so many conveniences, many consumers still don not see the need for mobile banking, and many of them also are skeptical about the level of security around banking with their phone. Among users of mobile phones who have...

Words: 743 - Pages: 3

Free Essay

Cctv

...Print this document        Security Systems & Cameras By Llanor Alleyne February 2,2015  ShareThis  rss  Order a reprint This Integration Guide was sponsored by Honeywell, as a supplement to Residential Systems, February 2015 In a millennium, when students are studying our present as their past, much will be made of the role of the smart phone in fueling a technology revolution. Undoubtedly this small device, which has already reconfigured how everyday people engage with not only each other but also other devices around them, has given way to the Internet of Things concept, which gains tractions seemingly daily. Indeed, the idea of connecting all of the things we surround ourselves with through a central device has been the basis of custom home automation, but it is relatively recently that a universal device—the smart phone or smart device—has been recognized as the potential hub manager for this level of control. The impact has been visible and quantitative, especially in the security systems sector, which has experienced tremendous growth as a consequence. “Mobile smart phones have really been the catalyst for integrated security systems,” said Delia Hansen, Crestron’s residential marketing manager. “Prior to them becoming mainstream, it was perfectly acceptable to have a large, unattractive security panel at the front door. Now people are looking for more sophisticated options. The smartphone has been able to provide an answer ...

Words: 2594 - Pages: 11

Premium Essay

What Business and Social Problems Does Data Center Power Consumption Cause?

.... What business and social problems does data center power consumption cause? Data center power consumption economically affects businesses and environmentally affects society. Operating costs for data centers is very expensive. In the article, "Ubiquitous Green Computing Techniques for High Demand Applications in Smart Environments," the total operating costs, concerning electricity, of all data centers within the U.S. alone exceeded 7 billion dollars in 2010 (Ayala, J., Moya, J., Risco-Martín, J., Sanchez, C., Zapater, M. 2012). The article then explains that data centers consumed 61 billion kilowatt-hours in 2006;the Environmental Protection Agency provided this statistic to the US Congress in a report from 2007 (Ayala, J., Moya, J., Risco-Martín, J., Sanchez, C., Zapater, M. 2012). With this amount of energy being consumed by data centers, it is a cause for concern; consequently, data centers have an impact on the cost of business and negatively impact the environment via carbon footprint. As the carbon footprint grows, there is a need to realign the way businesses looks at managing their data centers. Several companies including Cisco, Dell, Google, HP, IBM, and Intel have announced efforts to reduce the environmental footprint of their product offerings (Chang et al., 2012). Large technology companies are starting to understand that being environmentally friendly is good for the wallet and good public relations. Understanding how to manage and build better data centers...

Words: 4296 - Pages: 18

Free Essay

M Commerce

...developer of the mobile phone application you designed during assignment 1. 1) Remind me what your mobile commerce was and its name. ” My app is Child Care ” ** Description my app: log in by username and password OR signature Search page: choose your language and your Location ” country “ è City and suburb Then select full time OR part time and with food or not, and age your child The app give you list of child care to available with price, distance, address, map,…. If you choose one of them the app give you more information about it such as photo center, staff, game,… and contact and support chatting ,Facebook, twitter. Translation and Booking Booking page: enter your information child and payment and receive receipt by iPhone or email. 2) List all the mobile payments you know (e.g. credit card, Vouchers, PayPal, fingerprint,….) and explain how each of them they work and what you need to do as an application developer to be able to use them. 3) How would you personalise the application to the individual users? And why? 4) What would be your strategy to advertise for your app? Content, where, when and why? 5) How can you include external advertising in your mobile phone app? Where do you get the ads from and under what criteria – be precise? 6) How would you use business intelligence and data mining for your application? Be precise Section two Question 3 – Security Explain the terms...

Words: 1876 - Pages: 8

Premium Essay

Wireless Networks Essay

...of a dog. When a dog turns one year old, they are technically seven years old. Every year technology advances seven times further then technology was the previous year. There are many challenges that are faced the advancing new technology and social wireless media. The biggest challenge is security. Many companies and individual users would like to know that once they let their information leak wirelessly that the information is secure. Hackers are more present than ever before in the world of wireless communications. If a company wants to have wireless media for their telecommunications then they are going to have some pretty good security protecting all of their information. The government even has problems trying not to let any information get leaked over the web. Many of these companies that have chosen to have all of their communications go wireless also have chosen to do a lot of their business over smart phones. Smart phones are such a huge advancement in the technology age. Smart phones have changed the business landscape forever. There are just too many things that smart phones and ipads and all of these new gadgets that are coming out can do within a business. However smart phones have by far taken over most notably in the consumer arena. (Christensen,...

Words: 470 - Pages: 2

Free Essay

Lan Based Examination

...Thistechnology and services have undergone a huge development since the first cellular andcordless telephone systems were introduced in 1980s.The first generation of cellularphone was based on analog FM technology. This generation only has voice serviceonly.Second generation cellular phone next were introduced in the early 1990.Thisgeneration use the digital modulation and have an improvement on spectral efficiencyas well as voice quality. However this second generation still uses the same features asfirst generation technologies According to an investigate by ABI Research, at the end of 2013, 1.4 billion smart phones has been in use: 798 million of them run Android, 294 million run Apple’s iOS, and 45 million run Windows Phone. Smart phone usually support one or more short range wireless technologies such as Bluetooth and infrared, making it possible to transfer data via these wireless connections. Smart phone can provide computer mobility, ubiquitous data access, and pervasive intelligence for almost every aspect of business processes and people’s daily lives. The use of Bluetooth technology in a smart phone today is not just for the transfer of data and files only. Inrecent years, smart home automation is one of the applications of Bluetooth technology. We offer a door automation system based on Bluetooth technology, especially in door automation system. 1.1 Background of the Study There are some factors that must to be...

Words: 4403 - Pages: 18

Premium Essay

Smartphones Impact

...there creation smartphones have come a long way in what they can do. Smartphones now allow user to talk, text, tweet, search, email, check the weather, get directions, take pictures, find restaurants, pay bills, shop, listen to music, and do so much more from the palm of out hands. While this makes life easier are smartphones causing problems? With security problems and social issues arising with the increased use of smartphones, smartphones may be not such a smart idea after all. Background Smartphones have been around since 1993. IBM created the first smart phone called SIMON. This phone was created to combine “voice and data services into one package, as the device acted as a mobile phone, a PDA and even a fax machine” (Reed, 2012). This smartphone was rare possession considering it could be purchased for the price of $899. While the Pilot created by Palm is not a smartphone, it is credited for popularizing handheld PDA (Personal Digital Assistant) devices (Reed, 2012). In the late 90’s the Nokia 9110 Communicator was the start of keyboards on phones with its original fold out keyboard (Reed, 2012). In 2002 the first phone capable of receiving emails and web browsing was created, the Blackberry by RIM (Reed, 2010). With a few more attempts form other companies the smartphone was never a huge success until 2007 when Apple released it’s first iPhone. Its success was in its advanced web browsing and touchscreen display (Reed, 2012). In 2007 Android introduced the Droid to...

Words: 1128 - Pages: 5

Premium Essay

Mobile Computing

...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...

Words: 3950 - Pages: 16

Premium Essay

Unit 3 Discussion 1: Access Control Models

...Access Controls should be used in this scenario because the company is small and not in need of high security environment. This solution is the simplest to maintain and monitor for a small business. 2. Top Ads is a small advertising company consisting of 12 computers that have internet access. All employees communicate using smart phones. Mandatory Access Controls should be used in this scenario because the employees primarily communicate using smart phones, which opens up a security risk. Mandatory Access Controls are a step up stronger than Discretionary Access Controls, but are still relatively simple to monitor for a small business. 3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have internet access and 45,000 servers. All employees communicate using smart phones and e-mail. Many employees work from home and travel extensively. Role Based Access Control should be used in this scenario because this is a large company with employees who travel and work from home. The roles should be controlled by a Security Administrator who could provide different levels of security to individual users. There would be some overhead in startup to get up and running but once in place this should be easy to manage. 4. Backordered Parts is a defense contractor that builds communication parts for the military. All employees communicate using smart phones and e-mail. Content-Dependent Access Controls should be used in this scenario since the company is manufacturing...

Words: 407 - Pages: 2

Free Essay

The Smart Home

...Ruth Rininger Professor Alma Scott CINT 106 7 May 2013 The Smart Home On your morning commute, have you ever thought, did I turn the hallway light off? What about the coffee maker? Did I set the security alarm? With a smart home, you wouldn’t worry about these things at all; you would just pull out your smart phone or your work computer, visit the Internet, and control your house. Have a hard day at work? When you walk in the door, you can have your favorite music playing and the lights dimmed. Worried about what your teenager is doing to your house while you’re away? Just watch him or her online from wherever you are. Do thoughts of the smart home bring to mind images of the Jetsons? The technology is not quite to that level, but give it time. What is a smart house? According to Craven, “a smart house is a house that has a highly advanced automatic systems for lighting, temperature control, multi-media, security, window and door operations, and many other functions” (1). Practically anything in your home can be networked, including drapes and shades, gates, garage doors, door locks, doorbells, lights, dishwasher, refrigerator, heaters, alarm clocks, washer/dryer, microwave, coffeemaker, hot water system, air conditioners, central vacuum system, water controls, pool cover, fireplaces, toys, e-books, lawnmower, cars and other vehicles, piano, weather station, and furniture. Also able to be networked are audio and video devices, such as receivers, amplifiers, speakers...

Words: 1324 - Pages: 6

Premium Essay

Nt1330 Unit 3 Exercise 2

...opens the backdoor for malware to enter the apps camouflaged as secure applications. Also, jail broken phones are of huge risk if the user continues using the default password and an even higher risk if not used in their respective marketplaces. Instances of malware exist on all of the phones and are even more relevant on ones using untrusted app sources. - Enable whitelisting which is a software control that permits only known safe applications to execute commands. v. Dependencies: Earlier we discussed about Belkin WeMo device and its vulnerabilities. These devices operate using WeMo App which can be downloaded to our smart phone. In this case, to ensure security, we must determine vulnerabilities in both the gadget and the smart phone carrying the WeMo app. For example, vulnerability in the gadget can automatically make the smartphone to be in danger. Similarly, security hole in the app can take control of the WeMo device itself. III. Does this device have a storage space? What are stored in it? Smart devices has a storage space and we store PII (Personally identifiable information) or sensitive information like passwords in it. This by default becomes our concern. What if the device is lost or stolen? Once we understand, there are data stored in the device; the first...

Words: 917 - Pages: 4

Premium Essay

Mobile and Wearable Devices

...faster. Macro companies are seen to bet small wearable devices. Talking of wearable devices, such concerns a broad category of trackers that includes: fitness trackers, smart watches, smart glasses, clothes with embedded sensors and even tattoos. Wearable devices are not meant to replace smart phones, on the contrary, they act as satellite device that give useful data Apple iwatch Apple iwatch can only be paired with another iphone but one at a time. Another security feature of the apple iwatch is that they have not activated the activation lock in the apple iwatch yet. Hence, in times of the iwatch being stolen, someone will not be able to access the owner’s data since pairing this device to their phone will immediately delete all data clean. It has a standard blue tooth 4.1 that is used for pairing. (Lobodzinski, 2012) Encryption keys used in the iphone for communication between apple watch and the iphone are also much secured using class-based protection. Apple watch has an in-built wi-fi. When it is outside the range of its Bluetooth icloud is used as connection between the devices. When apple iwatch uses siri security, the device randomly uses its own random identifier. It produces all information that apple phone has sent to the iphone. Fit Bit In fit bit security the employees can access the fit bit security account with a click. On the other hand, the administrators have ability to control who has the access to corporate cloud accounts. Accounts of groups can be managed...

Words: 515 - Pages: 3