Wednesday, 21 September 2016

Mobile Computing Security Issues

Security Issues


Introduction:

Mobile computing is developing very fast 
recently for the improvement in the performance of some issues (handoffs, routing...), but there is another issue that has to be considered, which is important for every user of mobile devices, and that is security.



Wireless Mobile Communication Networks:

The networks included regarding this issue are:
  • Wireless Lan.
  • Wireless Access Point.
  • Cellular Networks.
Using these three networks, the hackers can access the mobile devices and we can classify the type of threats and security challenges into two main categories:


  1. Security problems that are related to the transfer of the data between the mobile devices and mobile support stations and networks.
  2. Security problems that are related to the data and the informations that are in the mobile device itself.





The Common Problems of The Mobile Security:


  • The mobile devices have a lack of passwords for the authentification and control access, and even if users do use passwords or PINs they usually make passwords that are easily bypassed, thus, it will increase the risk of accessing the devices.
  • Some systems use static passwords which can be guessed, forgotten, written down or stolen, rather than the two factors authentification, that is very important to maintain high security levels than traditional passwords and PINs, this high level of security is necessary for sensitive informations and transactions.
  • Using Wireless Transmissions that is not totally encrypted, sometimes when users send emails, and other informations, it will not be encrypted, another thing is the applications that transfer and receive the data also don't encrypt the data stansmitted.
  • While doing the daily activities, the mobile devices may download malwares witout even knowing that, it's disguised in different ways: games, security patches, utilities or any other kind of applications.
  • Often, the mobile devices don't use security softwares to be protected agains't malwares, spams and so on, cause some of the devices come with a preinstalled security software and some others don't. 
  • The operating systems may receive a late updates, so it can be running out of date, it's up to the device manufacturers to develop certain device updates incorporating the vulnerability fix, it taes more time if the company is going to change properietaries to the device's software. Also there are devices who are older than 2 years and they will no longer receive software updates this strategy help the companies to sell their new products yearly.
  • Lot's of mobile devices don't limit of internet connections cause they don't have firewalls, the mobile devices connect with others using communications ports when they're connected to a wide areas networks, so it's easy for the hackers to access the devices using these ports that aren't secure.
  • Some mobile devices can be modified without authorisation in order to remove the limitations by what's called the jailbreaking or the rooting, this process changes the security management in the devices modified, thus the risks of getting hacked increse.

The Common Ways of Protection:
There are several ways for mobile device users to make it harder for the hackers to hack them:



  • Use security passwords and enable authentification of the user.
  • Check the resources of the downloaded applications and verify the authentifications.
  • Buy the antimalwares against malicious applications, viruses, spyware, infected secure digital cards,b and malware-based attacks.
  • Make sure the device is using a firewall.
  • Make sure the operating system is up to date.
  • In case of lost devices, disable the device and erase the data remotely.
  • Encrypt the data stored in the device or the memory card.
  • Use what's called by whitelisting, which means permitting only the safe applications to be processed.














No comments:

Post a Comment