Essay Mobile Application Security

4021 Words May 23rd, 2013 17 Pages

Today’s smartphones and tablets are more than communication devices. They are hip-mounted personal computers, with more memory and processing power than your laptop of just a few years ago. They are an integrated part of our lives… personal and professional. The information they provide is so vital that the Army is piloting their use as standard field issue to every soldier, complete with combat-focused applications [1]. However, smartphones and tablets raise new security issues. They are more likely to be lost or stolen, exposing sensitive data. Malware risks are increased because they connect to the Internet directly rather than from behind corporate firewalls and intrusion-protection systems.
…show more content…
Using a mobile device to access corporate email or other resources extends the threat to the organization, including the theft of sensitive data [2]. With the acknowledged role of mobile devices and social networks in the revolutions in Egypt, Libya, and Syria, malware and viruses targeted at intelligence gathering and device-usage denial will increase significantly in the future [3]. While viruses and malware targeting mobile devices would share many of the same goals as on the PC, the enhanced capabilities of these devices present expanded attack surfaces through sensors such as GPS, accelerometer, camera, microphone, and gyroscope. Recently, Kaspersky Lab discovered a new threat involving the photo-scanning of Quick Response (QR) codes [4]. QR codes are 2-D matrix barcodes increasingly used in advertising and merchandising to direct mobile-phone users to a website for further information on the tagged item. In this case, users downloaded what they thought was a legitimate app, but instead was malware that sent Simple Message System

Safeguarding Data in a Mobile Device World
Sean C. Mitchem, Southwest Research Institute Sandra G. Dykes, Ph.D., Southwest Research Institute Stephen W. Cook, Southwest Research Institute John G. Whipple, Southwest Research Institute
Abstract. With the proliferation of mobile devices in today’s information-rich environment, the security of data at rest

Related Documents