0% found this document useful (0 votes)
42 views4 pages

Assignment 3

This document discusses mobile security issues and provides recommendations. It covers issues such as loss or theft of mobile devices leading to potential data disclosure risks. External storage devices increase this risk unless data is encrypted. Mobile devices often run outdated operating systems with legacy code and lack timely security updates from manufacturers. The document recommends encrypting data, using screen locks, updating apps, and being wary of permissions for improved mobile security.

Uploaded by

Sankalp Rane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views4 pages

Assignment 3

This document discusses mobile security issues and provides recommendations. It covers issues such as loss or theft of mobile devices leading to potential data disclosure risks. External storage devices increase this risk unless data is encrypted. Mobile devices often run outdated operating systems with legacy code and lack timely security updates from manufacturers. The document recommends encrypting data, using screen locks, updating apps, and being wary of permissions for improved mobile security.

Uploaded by

Sankalp Rane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

SoI72

PAOEHo
DATE
Astignment 3 MAD

i ssue.
mobile Secunty
Lst A.explain
Mobile Seturity lssues

Dece
&xttnal Sdrage
Y
Keybooro
0a Pnva
APplicaltion Setun u y
legacy Code

Device
Man of us havegt Some pontlost a
Many celludr
devte.Gefor tre adynt:i of SpaSnartphon e. meo
locing one's contac infmation on a typicat CAnd.oi)
Smatpnor, bday _howerer e lollowinq is frue dr mast
of
Loation &6PSdota
Hea lth dat
E-mails Saed on he mbile devite i

Aub sinin facepok, yml Twittr


che.
bankQttoh

Unless Hhe devite is entpked h e loss a (w


phone mp.lles a pottntial datadisclosurtisk 0S
well Plug in a (ellphoe a(ormpuler
Voris ooindudiry toret .odlsWidl
Voios
e rest
OA

Patcning
And roid atest Version3.2. H ouwever most den es
in wsc tbc dy are runnir anythirgrom, Androrct
Ardrbtok 23 wit - 23 bei e nost
Ac rold 6-0-6. nd nd 1-0 Sept 82o20
furermore ege devites are updatd I mo cdifiesl
pectVe mans fackuregThus it is ci Giult
dppl paesIn_a timelymanrorÄVen
ade an bri OS ged Comor his to
He Pnoe where 1oS 3 tos 4 are te ony
ersion avallable oday

Removople Extrnal «brdge tompoundyhe data


secuvihISSue i-lt is muo'eagier o (ogeSp cards tho
o lose (el_phore n e most cajes.data '
entuypteds1 coris aleo vayel 4 hough multip e
deids, hus in vagy e rkk L
.
uardS:
Shoulodler Sut &:hrsyeir. refMeced back tb
back
eSreen a Srmuolges On Sureo Scre
Vmou ouso Cid aHade

Data PÀr
ItCon shre nbmaion in ache
Coun dtply aols
haLd on douo
badon cota c@n rerea Sekshve
IomaHOn
PAOE
OATE

Appllcahon Secun
Tyaoli hel tuck SOu XSS, JSZ
ead eru a thchs nour GMn
t dada 0rolabil
ecpa uy Coce

odla. CALed : 6SM grCDMA COMmuc


hoAnot.Chotged Buffr0reMoyCh
add ne code or top.o eust Cocu
Seeolan seui Mode
Consist o Unu_comel d pplkcoution laes

-piSnin UiRID ar ea applican a


nau_
Snarnrg. Con otcutmrou Coruponor
fntrgtVE.
-Uus proces Sundbx
2 pplicaton Sandkk
Pond (Poprittt mm Proteona

uticontc (OnnNoha

Middlewre
Dal vi v is not a seum boune
NO seCun Mana
PerMss n enfreel n nof in
AGE No.

DATE

Application ta
- Pemns

resr Orpoerd inteadn


MAC onfur o Perence Mona
Octca Mgrfor Ativi Maneg
enone pomissm
PenmsM
dc regoc8

kUser appmrol.

AtM SeviC_Boadleog1 ecdosr (ontn


Pro o or \ntot

You might also like