Challenge In Mobile Device
Last Updated :
06 May, 2019
Believe it or not there are security risks when using a mobile device. We know, it is surprising right, that your phone or tablet could be a possible threat to your safety. When you consider all the potential threats that exist on the Internet and the fact that most of today’s mobile devices are connecting to and through the Internet with every function, I think it becomes easier to understand just how vulnerable they are. While more of the threats are the same as those faced by the average laptop or desktop user there are some unique to the mobile world. Mobile phone security threats generally include application based, web-based, network-based and physical threats.
1. Application based threat:
The most of application are downloadable and purposed the most common risk for mobile users; most devices don’t do much on their own, and it is the applications that make them so awesome and we all download apps. If it comes to apps the risks run from bugs and basic security risks on the low end of the scale all the way through malicious apps with no other purpose to commit cyber crime.
- Malware
- Spyware
- Privacy
- Zero Day Vulnerabilities
2. Web based threat:
According to the nature of mobile use, the fact that we have our devices with us everywhere we go and are connecting to the Internet while doing so, they face the number of unique web-based threats as well as the run-of-the-mill threats of general Internet use.
- Phishing Scams
- Social Engineering
- Drive By Downloads
- Operating System Flaws
3. Network-based threat:
Any mobile devices which typically support a minimum of three network capabilities making them three-times vulnerable to network-based attack. And a network often found on a mobile include cellular, WiFi and Bluetooth.
- Network exploits
- WiFi sniffing
- Cross-Platform Attacks
- BOYD
4. Physical Threats:
It is happened any time, unlikely a desktop sitting at your workstation, or even a laptop in your bag, a mobile device is subject to a number of everyday physical threats.
- Loss/Theft:
Loss or theft is the most unwanted physical threat to the security of your mobile device. Any devices itself has value and can be sold on the secondary market after all your information is stolen and sold.
Similar Reads
Technical Challenges of Mobile Computing Mobile Computing is defined as a computing environment which is mobile and moves along with the user. There are various number of challenges that affected mobile computing and it has to overcome them. Some of the major technical challenges faced by mobile computing are: 1. Mobility 2. Wireless Mediu
2 min read
What is Mobile Device Management (MDM)? Mobile device management is a kind of security software that enables businesses to ensure compliance with company guidelines in controlling, monitoring, and securing employee-owned devices. Enterprise file sync and sharing, identity and access management, and mobile application management (MAM) tech
9 min read
Mobile Forensics - Definition, Uses, and Principles Mobile Device Forensics also referred to as cell phone forensics, is a specific subcategory of digital forensics that involves the recovery of digital data from smart mobile devices such as smartphones and tablets. Taking into consideration that these devices are used in various aspects of personal
7 min read
Cyber Crime - Mobile Security Threats Mobile devices have become essential for performing everyday tasks, from communication and banking to remote work and entertainment. With the exponential increment in mobile users globally, the volume of sensitive data being processed and transmitted through these devices has also increased signific
6 min read
What is Mobile Security in Cyber Security? Mobile device security is important to keep our smartphones, tablets, and other portable devices safe from cyber criminals and hackers. The main goal of mobile device security is to keep our devices and other electronic devices safe from being hacked or other illegal activities. In our daily lives,
10 min read