0% found this document useful (0 votes)
3 views4 pages

Mobile Computing Lab (2b)

The document discusses the risks associated with using mobile financial applications like M-Pesa in real-world environments compared to controlled laboratory settings. Key risks include security vulnerabilities, network connectivity issues, privacy concerns, device theft, human error, system reliability, and environmental distractions. In contrast, laboratory environments offer enhanced security measures, controlled access, and trained personnel, reducing the likelihood of these risks.

Uploaded by

chegechris959
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views4 pages

Mobile Computing Lab (2b)

The document discusses the risks associated with using mobile financial applications like M-Pesa in real-world environments compared to controlled laboratory settings. Key risks include security vulnerabilities, network connectivity issues, privacy concerns, device theft, human error, system reliability, and environmental distractions. In contrast, laboratory environments offer enhanced security measures, controlled access, and trained personnel, reducing the likelihood of these risks.

Uploaded by

chegechris959
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Using mobile-based financial applications like M-Pesa can introduce various potential hazards

compared to using such systems in a more controlled environment like an indoor laboratory.
Below, we'll explore the risks associated with mobile applications in real-world scenarios and
compare them with the relatively safer, more controlled setting of a laboratory.

1. Security Risks

Mobile Environment

 Malware & Viruses: Mobile devices are more susceptible to malware, spyware, and
viruses that could compromise personal information, including financial data. If users
download malicious apps or click on fraudulent links, their M-Pesa credentials could be
stolen, leading to unauthorized transactions.
 Phishing & Social Engineering: Mobile devices are frequently used for communication
(SMS, email, social media). Cybercriminals can exploit this by sending fraudulent links
or messages to trick users into revealing sensitive information such as PINs or passwords.
 Weak Device Security: Many mobile phones may not have adequate security features
(like encryption, multi-factor authentication, or strong passwords), especially older
models or phones without updated software. This increases the risk of unauthorized
access.

Indoor Laboratory Environment

 More Controlled Access: In a laboratory, systems are typically secured with multi-
layered protection (e.g., firewalls, encryption, physical security) and are often isolated
from the internet or external networks.
 Secure Devices: Laboratory systems are often specifically configured with strong
security measures, like firewalls, secure network protocols, and updated anti-virus
software to protect data. There's less chance of malware spreading through physical
security, and these systems are monitored more closely.

2. Network Connectivity and Vulnerability

Mobile Environment

 Unsecure Public Networks: When using mobile devices in public spaces (e.g., cafes,
public transport), users often rely on unsecured Wi-Fi networks. These networks can be
easily intercepted by hackers, potentially exposing sensitive information such as M-Pesa
transaction data.
 Mobile Network Weaknesses: Mobile data networks, while generally secure, may still
be vulnerable to interception or congestion, especially in areas with poor service.

Indoor Laboratory Environment


 Controlled Network Access: Laboratory environments often operate in secure, private
networks with controlled access and encryption protocols, making it more difficult for
unauthorized users to access or intercept sensitive data.
 Firewall and Intrusion Detection: Laboratories may implement dedicated firewalls and
intrusion detection/prevention systems to safeguard against any unauthorized attempts to
compromise the network.

3. Privacy and Data Breaches

Mobile Environment

 Location Tracking: Many mobile applications, including M-Pesa, use GPS features that
track the user’s location for convenience (e.g., showing nearby agents). However, this
data could be vulnerable to misuse, potentially exposing the user to stalking, surveillance,
or identity theft.
 Data Collection and Sharing: Apps can gather personal information beyond just
financial data, such as location, device identifiers, and usage patterns. If the data is not
adequately protected or anonymized, it could be sold to third parties or used maliciously.

Indoor Laboratory Environment

 Less Risk of Unwanted Data Exposure: In a controlled lab environment, sensitive data
is generally not shared or exposed to the same degree. It’s easier to restrict who has
access to data, making it less likely that personal information will be leaked or misused.

4. Device Theft and Loss

Mobile Environment

 Physical Theft: Mobile devices are portable, which means they are easily lost or stolen.
If a phone is not properly secured (e.g., password protected), thieves can access financial
applications like M-Pesa, potentially draining funds or transferring money without the
owner’s consent.
 SIM Card Cloning: If a SIM card is stolen or cloned, a malicious actor could potentially
gain access to the mobile money account, assuming they can bypass other security
features (like PIN or biometric authentication).

Indoor Laboratory Environment

 Less Risk of Physical Theft: In a lab setting, devices are generally stationary and
secured in a physical location, reducing the chances of theft or loss. Access to devices is
usually limited to authorized personnel.
 Controlled Physical Access: Most laboratories use security measures such as locks,
surveillance, and restricted access to prevent unauthorized individuals from accessing
sensitive devices or data.
5. Human Error and Lack of Training

Mobile Environment

 Unintentional Mistakes: Mobile apps are used on the go, in various environments, and
by people with varying levels of technical expertise. This leads to a higher likelihood of
human error—e.g., sending money to the wrong person, using weak passwords, or
mistakenly accepting fraudulent requests.
 Social Engineering Attacks: Since mobile applications like M-Pesa can receive SMS or
voice calls, users may unknowingly respond to scam messages or phone calls pretending
to be legitimate services (like M-Pesa support), leading to security breaches.

Indoor Laboratory Environment

 Trained Personnel: In a laboratory, users are typically more experienced and better
trained to use the systems securely and efficiently. The likelihood of human error is lower
due to controlled access and specialized training.
 Fewer Social Engineering Attacks: Since the system is often used by professionals in a
secure environment, social engineering attacks are less likely to be successful. There's
less temptation for unauthorized individuals to try and trick users.

6. System Reliability

Mobile Environment

 Battery and Performance Issues: Mobile devices have limited battery life and
processing power. A failure in device performance (e.g., slow loading times, crashes)
could disrupt transactions, especially in critical situations where a user needs to make
quick payments.
 App Crashes or Errors: A bug or malfunction in the M-Pesa app or mobile system
could prevent transactions from going through, leading to lost funds or frustration.

Indoor Laboratory Environment

 More Stable Systems: In a laboratory, desktop or server-based systems are usually more
reliable and stable due to superior hardware and infrastructure. Downtime and crashes are
less frequent, and backups are typically in place to recover lost data.

7. Environmental Factors

Mobile Environment

 Environmental Distractions: Mobile devices are often used in environments full of


distractions, like busy streets, public transport, or even crowded cafes. These distractions
can increase the risk of mistakes (e.g., entering the wrong number or making a wrong
selection) or reduce user awareness of security threats (e.g., shoulder surfing or data
theft).

Indoor Laboratory Environment

 Controlled and Distraction-Free: A laboratory environment is quieter and free of


distractions, providing users with a more focused and secure experience when interacting
with financial systems or conducting transactions.

You might also like