Aspects and perspectives of the development of information security of mobile devices

Posted: December 11, 2012 in Articles
Tags: ,

Vulnerability

Mobile devices security

Every day, numbers users of mobile platforms is increasing. Most recently, Google celebrated the activation of the 500 millionth device platform Android, Apple by the numbers a little bit behind – 365 million devices.

But you must agree that the numbers and dynamics of development is impressive. Smartphones and tablets are increasingly part of our daily lives, becoming not a luxury but a necessity. Life ‘OnLine’, access to the information here and now without any restrictions – these are a few of the benefits that mobile devices. Information is always available. It’s easy and convenient. However, such rapid growth could not be overlooked by the criminal information society – hackers. Is your data belongs to you?

At our first meeting friendly interface mobile device immediately offers you make to it information about profiles in social networks, user e-mail and other Internet – services. This step is designed to blur the boundaries between the various services and to connect them to your device. Messages from a contact on the desktop alert appointments from Google – calendar entries friends on Twitter. Convenient, is not it? The unit is getting to you a personal assistant – helps make your day, do not forget important information or have fun in a spare moment. Research experts, about 70% of users of mobile devices to store sensitive information such as passwords and credit card numbers of frequently visited sites, corporate documents, and more. However, few users thinks that not only can they have access to their data.

Let me give you a few tips to increase the level of security of your information on your mobile device:

  • Do not download applications from unknown sources. For IOS – AppStore, for Android – Android market. IOS for all difficult to boot from another place, of course, if you have not broken the system. If you still want to boot from another place, do not be lazy and read the comments to the file. It is possible that messages are abusive / obscene nature, or messages that are similar to spam, such as “Great app, all rock!” Profiles of different users. This fact should make you suspicious in the security of the file.
  • When installing an application, many users did not hesitate to answer yes to all the questions that asks the system. Try to pay attention to at least the permissions, access to which you grant the application. Why app ‘Flashlight’ access to call or send SMS to premium rate numbers?
  • If suspicious application is already installed, you can track its activity through the Task Manager, which will help to track the activities of a fact-applications in the background, the level of consumption of the traffic volume occupied memory. The fact that high consumption of traffic applications, whose main function is not connected to the Internet – an activity raises.
  • When using the different online – services, try to at least for the most important not to use the save passwords. This will complicate the attacker access to your personal data in case of theft of services unit. Necessary to realize that you make it easier access not only themselves, but also to anyone with your gadget in the hands.
  • If you want to significantly enhance the security of network accounts, then you need a frequency of 1 – 3 months to perform the password change. This transaction significantly complicate password guessing to intruders. Just in case, save this password on what – or computer, access to it will be limited in some time.
  • If you keep what – or sensitive data on your phone (passwords of websites, credit card, the answers to security questions, what – or personal documents), then take care of their safety. You can use a text document, a password-protected, or to store the information in the appropriate software.
  • The use of different software antivirus nature also enhances the security of your information, and the whole set. Currently, it is not just protection from viruses and antitheft, anti-spam, parental controls, and more. But do not forget that for all this functionality you have to pay performance of your device.

At the moment, the security of mobile devices is difficult to assess as acceptable. More than 80% of users do not use any – or measures to improve the security of information, and the remaining 20% ​​use their ‘heuristic’ methods of protection or related software. The number of viruses increases year by year, in the second quarter of 2012 on the Android platform, there were about 10,000 malicious software, IOS, fortunately for holders of ‘apple’ product is out of danger due to the closure of the operating system (however compromised devices also fall within the risk). What methods of protection can be assumed in the future?

As expected steps of development in the field of system security of mobile devices can be identified:

  • Programs for protection, based on a modular design approach. Each user will be able to find a number of services that it needs and to pay each of them, say 50 cents. This scenario is a step in the customer-centric approach. Nobody wants to pay for what he is going to use it. If you want real-time protection, firewall and backup – pay 01.05 dollars. If expensive, then you can give up one of the items and buy later.
  • Just excellent vehicle safety are web-services operating system vendor / devices to perform a series of actions with the devices attached to a single client account. As an example, already functioning service for users of IOS, which allows you to track the location of their gadgets on the map. As an evolution of this idea can offer remote locking devices, reset, send an SMS with specific data on the number you specified earlier.
  • In conclusion I would like to note that most people consider the possibility of this threat is minimal. However, when the native gadget starts to behave strangely, most of them are in the service-center and pay money for the repair or diagnosis, although it may follow a given set of rules any problems could have been avoided.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s