Mobbo Secuirty Case Study

Decent Essays
Mobo Secuirty
Type: Secuirty Application
Short description:
Mobile devices are the most important part of our lives. Now a days what you do or want to know what others are doing. If you want to save your precious moments in that case you also use mobile. In that case all your memories stored in your mobile. So mobile security is getting importance day by day and people are getting more and more concern to secure their privacy.
Keeping this thing in mind we have decided to create a security application that will help to protect or privacy in case if we lose our mobile device then we can do something to keep track of our device and do can take an action against the responsible authorities.
Ingredients
PROJECT CONTENTS:
1. Login System
2. Sound
…show more content…
IMEI/MEID Tracking
1. Login System
Login system is very important part in any privacy related system/application. In Login screen user has an option to set password for his/her application. He has multiple different ways to set password. In case if he forgot his password he has the option to recover his password by answering some questions. We have a unique facility that if you want to know who is trying to access your private information. This application will take the photo of the intruder (Front camera required).

2. Sound an Alarm
With this feature you are able to sound an alarm whenever you lost your device. So your device is either on silent mode or set at a very low sound it will make a load alarm sound that identifies you with in a short area.
3. Erase Memory
If your mobile is lost and there is no way you can do or first thing that you wanting to do is to wash out your memory in which all of your private data includes like pictures, videos or any other important files. You can delete all of them from any other mobile using the command code.
4. Backup your Contacts
You can take a backup or you contacts and store it to some other place so if you lose any of then you can restore than from our application easily.
5. Take
…show more content…
SIM card change Alerts
If your phone is lost and SIM card is changed, an alert SMS will be sent to the reporting number. So that you can get the new number of your lost phone .Hence by using that new numbers you can perform any action that you want.
7. Call Tracking
Call tracking is a feature through which user maintain call history related to any contact or number. Later on he can check record regarding to any contact.
8. SMS Tracking
In SMS tracking user can store and view all SMS of any contact that will be stored in the directory of the application.
9. Call Blocking
To get rid of the annoying people user can use the call blocking service of the application. By putting contacts to the black list user don’t need to worry any more.
10. SMS Blocking
Just like calls if user doesn’t want to receive messages from any unknown person, here he has the option that he can avail and stay calm.

11. Location Detection
If you lost your mobile or it is stolen you don’t need to worry about that just send your secrete code to your number and you can check your location anywhere in the world.
12. IMEI/MEID

Related Documents

  • Decent Essays

    Sony Xperia Case Study

    • 996 Words
    • 4 Pages

    Take a backup of your phone. Once the rooting process is complete, you won’t find any data in your Xperia E1 and everything will be wiped out. So make sure you backup everything before you proceed further. Backup your contacts list, text messages, photos, videos, and everything else you need to. 2.…

    • 996 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Encryption Of Cell Phones

    • 1692 Words
    • 7 Pages

    When a cell phone user is reaching out via Wi-Fi network it can be unsafe, ex. a free coffee shop network. Those Wi-Fi networks are open playgrounds and opportune times for thieves to snatch your information. When not using Wi-Fi on your phone, turn it off to be more secure and save battery life. Smarter cell phone security is the way.…

    • 1692 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    FRAMEWORK FOR MOBILE APPLICATION INCIDENT RESPONSE P2273379A 1. INTRODUCTION Mobile technology has penetrated people’s daily lives. Mobile technology brings a lot of positive effects to human lives, ranging from education, research, entertainment, health sector, social media, shopping and banking. However, the development of mobile technology has also a negative effect. As an example, people can do mobile banking, checking balance, transferring money, purchasing online and the like.…

    • 1344 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Another way to prevent identity theft is by making sure the web page you’re purchasing an item from or putting your personal information on has a little lock symbol in the web search bar. This lets you know you’re on a secure and legit page that will protect all your information. Also do not make purchases from websites that advertise the ‘too good to be true’ specials. These websites are usually scams that make you enter your information and then say something like ‘sorry, this webpage is unavailable’ or something to that effect. Never make purchases from a site that you’ve never been on.…

    • 1031 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Password Security Threats

    • 2482 Words
    • 10 Pages

    Password security is a very important topic with many counterparts. It is important to know the security risks involved with passwords. Complex passwords have become very popular for businesses in order to log into your office computer. Often times you are required to change that complex password on a regular basis as well, which can make remembering the password extremely difficult and will often times cause the user to write it down or store it somewhere. Often times employees may share their passwords with a co-worker and this can be for a logical reason should anyone need to access that information if the person is out sick.…

    • 2482 Words
    • 10 Pages
    Decent Essays
  • Decent Essays

    Cyber Bullying Prevention

    • 1054 Words
    • 5 Pages

    One way is to put any account made on instagram on private. This eliminates the risk of anonymous bullying. A person can choose who is allowed to follow them and no one can see any posts unless they are allowed by the owner of the account. Another way is to block and report any account that bullies. Blocking makes the person’s account who is being bullied like it is invisible.…

    • 1054 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    So what can you do to be safe on the Internet? Cormier states that there is many things to do to be safe. One of them is to add a Dual/Multi-factor authentication too your accounts. “The most used Dual Factor authentication choice you see is the text message. For your account, it will ask you for your password, and then after your password, it would send you a text message to a phone number that you already setup on the site.…

    • 1115 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    In that case make sure the computer has an updated version of antivirus software and run a complete scan of your machine. Sometimes it is possible that the browser you use is the only one that is corrupted by the virus. In that case, you could uninstall the corrupted one and install a new one that will probably be updated. Last but not least, the problem could be related to the website itself and not your computer. If a website come under a cyber-attack, it will be impossible to access it.…

    • 819 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    The last component is a Broadcast receiver. This is space specifically designed to receive data or signals. This can be used in tandem with Services and Content providers to receive updates such as an email app telling you when you get email. When all of the components put together, this explains how your phone’s system works. For example, if you turn on your device which is connected to the internet, and your mailbox on a web site gets a new email, then the device will alert you.…

    • 822 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Technology In Workplace

    • 1009 Words
    • 4 Pages

    If they let go of the button, your phone asks for a four digit passcode that was previously set up. If you type in that code, the app knows that you have made it home safe and sound. If the four digit code is not typed in, the police are contacted by SafeTrek and sent to where you are. Technology can also replace jobs in law…

    • 1009 Words
    • 4 Pages
    Decent Essays